Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security] exploiting vulnerable holes with DICSS #57

Open
jameslaydigital opened this issue May 30, 2015 · 1 comment
Open

[Security] exploiting vulnerable holes with DICSS #57

jameslaydigital opened this issue May 30, 2015 · 1 comment

Comments

@jameslaydigital
Copy link

Unlike CSS et al, requesting DICSS from untrusted origins opens opportunities for infection. CDNs that offer shared DICSS are also likely vectors for infection. We need to discuss ways to mitigate the consequences of cross-site injection.

XSS attacks can easily lead to sack overflows. Even with non-blocking DICSS, application will freeze. Additionally, sometimes DICSS is susceptible to general insecurities after a denial of service.

@assertnotnull
Copy link

Use ConDOMs (Content Delivery Origin Managers)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants