in reply to Re^3: Let users link in a javascript library (required)
in thread Let users link in a javascript library

My impression is that the allowed tags are already pretty much where they can and should be.
In my previous response, I was assuming you meant just the Perl Monks Approved HTML Tags. I'd forgotten there were the additional tags allowed for homenodes. What are your concerns about external imgs? They'd allow ipaddr logging; is there any other concern?
  • Comment on Re^4: Let users link in a javascript library (required)

Replies are listed 'Best First'.
Re^5: Let users link in a javascript library (required)
by moritz (Cardinal) on Apr 16, 2008 at 19:58 UTC
    Cross-site request forgery.

    Since most users allow the browser to load images, an external image can be used to trigger an GET request to an arbitrary URL, and the browser sends all session cookies of the target domain to that URL. Without any interaction from the user.

    While state change on the server side should not be triggered by GET requests they often are. So it's safer to forbid them.

      I don't get the (ab)use case. A monk sets up an external img; another monk visits the homenode and their cookies from that external site are sent to the external site? Can you explain the problem?

        If that remote URL is a application/javascript file, I think that versions of IE will run it, and likely within the Perlmonks security context.

        If that remote URL redirects back to Perlmonks, it can alter user settings, at least if there are holes left open here where we allow setting of vital things via GET.

        <img src="/?node_id=109;op=logout" /> isn't very nice, it will probably log out anybody who tries to load the image.

        Even if perlmonks has some kind of protection against that, many web applications don't. Every action that can be done with GET request can be triggered, and that's often change of email address, write an article or even delete a user.