Bypass httpOnly in Firefox 8.0.1 and Java 7ux
Enero 2, 2012
This vulnerability allows an attacker to read cookie values created by httpOnly mechanism using Java plugin for Mozilla browsers (npjp2.dll). Remember that: "The new release of Java is first made available to the developers to ensure no major problems are found before we make it available on the java.com website for end users to download the latest version. If you are interested in trying Java SE 7 it can be downloaded from Oracle.com", so there is no risk when using earlier versions of plugin.
All the credits goes to Mario Heiderich for publishing an image that contains some hints about the vulnerability (http://yfrog.com/gzsmipp).
This is the proof of concept
The code I used was:
var c = jurl.openConnection();
var h = c.getHeaderFields();
alert(h);
Como siempre vos al tanto de todo, muy bueno lo que haces y adelante en este 2012.
Como pasa el tiempo... Ahora publicas en ingles articulos supertecnicos. Si no fuera mi amigo pensaria que es marciano.
Gracias a ambos!
Te perdiste mucho tiempo BlessLOST
[...] to web server defect or other client-side packages. Check following links for more information: Bypass httpOnly in Firefox 8.0.1 and Java 7ux | Seguridad Inform