How do HttpOnly cookies work with AJAX requests

De openkb
Aller à : Navigation, rechercher

Sommaire

Questions

JavaScript needs access to cookies if AJAX is used on a site with access restrictions based on cookies. Will HttpOnly cookies work on an AJAX site?

 Edit:   Microsoft created a way to prevent XSS attacks by disallowing JavaScript access to cookies if HttpOnly is specified. FireFox later adopted this. So my question is: If you are using AJAX on a site, like StackOverflow, are Http-Only cookies an option?
 Edit 2:   Question 2. If the purpose of HttpOnly is to prevent JavaScript access to cookies, and you can still retrieve the cookies via JavaScript through the XmlHttpRequest Object,    what is the point of HttpOnly   ?
 Edit 3:   Here is a quote from Wikipedia:
When the browser receives such a cookie, it is supposed to use it as usual in the following HTTP exchanges, but not to make it visible to client-side scripts.[32] The HttpOnly flag is not part of any standard, and is not implemented in all browsers. Note that there is currently no prevention of reading or writing the session cookie via a XMLHTTPRequest. [33].

I understand that document.cookie is blocked when you use HttpOnly. But it seems that you can still read cookie values in the XMLHttpRequest object, allowing for XSS. How does HttpOnly make you any safer than? By making cookies essentially read only?

In your example, I cannot write to your document.cookie, but I can still steal your cookie and post it to my domain using the XMLHttpRequest object.

<script type="text/javascript">
    var req = null;
    try { req = new XMLHttpRequest(); } catch(e) {}
    if (!req) try { req = new ActiveXObject("Msxml2.XMLHTTP"); } catch(e) {}
    if (!req) try { req = new ActiveXObject("Microsoft.XMLHTTP"); } catch(e) {}
    req.open( GET ,  http://stackoverflow.com/ , false);
    req.send(null);
    alert(req.getAllResponseHeaders());
</script>
 Edit 4:   Sorry, I meant that you could send the XMLHttpRequest to the StackOverflow domain, and then save the result of getAllResponseHeaders() to a string, regex out the cookie, and then post that to an external domain. It appears that Wikipedia and ha.ckers concur with me on this one, but I would love be re-educated...

https://bugzilla.mozilla.org/show_bug.cgi?id=380418 https://bugzilla.mozilla.org/show_bug.cgi?id=380418

To reiterate everything I ve learned:

    • HttpOnly restricts all access to document.cookie in IE7 & and FireFox (not sure about other browsers)
    • HttpOnly removes cookie information from the response headers in XMLHttpObject.getAllResponseHeaders() in IE7.
    • XMLHttpObjects may only be submitted to the domain they originated from, so there is no cross-domain posting of the cookies.
 edit: This information is likely no longer up to date.  

Answers

Yes, HTTP-Only cookies would be fine for this functionality. They will still be provided with the XmlHttpRequest s request to the server.

In the case of Stack Overflow, the cookies are automatically provided as part of the XmlHttpRequest request. I don t know the implementation details of the Stack Overflow authentication provider, but that cookie data is probably automatically used to verify your identity at a lower level than the "vote" controller method.

More generally, cookies are not required for AJAX. XmlHttpRequest support (or even iframe remoting, on older browsers) is all that is technically required.

However, if you want to provide security for AJAX enabled functionality, then the same rules apply as with traditional sites. You need some method for identifying the user behind each request, and cookies are almost always the means to that end.

In your example, I cannot write to your document.cookie, but I can still steal your cookie and post it to my domain using the XMLHttpRequest object.

XmlHttpRequest won t make cross-domain requests (for exactly the sorts of reasons you re touching on).

You could normally inject script to send the cookie to your domain using iframe remoting or JSONP, but then HTTP-Only protects the cookie again since it s inaccessible.

Unless you had compromised StackOverflow.com on the server side, you wouldn t be able to steal my cookie.

Edit 2: Question 2. If the purpose of Http-Only is to prevent JavaScript access to cookies, and you can still retrieve the cookies via JavaScript through the XmlHttpRequest Object, what is the point of Http-Only?

Consider this scenario:

    • I find an avenue to inject JavaScript code into the page.
    • Jeff loads the page and my malicious JavaScript modifies his cookie to match mine.
    • Jeff submits a stellar answer to your question.
    • Because he submits it with my cookie data instead of his, the answer will become mine.
    • You vote up "my" stellar answer.
    • My real account gets the point.

With HTTP-Only cookies, the second step would be impossible, thereby defeating my XSS attempt.

Edit 4: Sorry, I meant that you could send the XMLHttpRequest to the StackOverflow domain, and then save the result of getAllResponseHeaders() to a string, regex out the cookie, and then post that to an external domain. It appears that Wikipedia and ha.ckers concur with me on this one, but I would love be re-educated...

That s correct. You can still session hijack that way. It does significantly thin the herd of people who can successfully execute even that XSS hack against you though.

However, if you go back to my example scenario, you can see where HTTP-Only does successfully cut off the XSS attacks which rely on modifying the client s cookies (not uncommon).

It boils down to the fact that a) no single improvement will solve all vulnerabilities and b) no system will ever be completely secure. HTTP-Only is a useful tool in shoring up against XSS.

Similarly, even though the cross domain restriction on XmlHttpRequest isn t 100% successful in preventing all XSS exploits, you d still never dream of removing the restriction.

Source

License : cc by-sa 3.0

http://stackoverflow.com/questions/27972/how-do-httponly-cookies-work-with-ajax-requests

Related

Outils personnels
Espaces de noms

Variantes
Actions
Navigation
Outils