Hacker News new | past | comments | ask | show | jobs | submit login

A browser allowing externally loaded scripts to access private ip ranges

There are plenty of legitimate systems in the ecommerce world that rely on doing this.

Take Ariba Punchout, for example. The idea is for the store to pass the user's shopping cart back into the customer's internal ERP system to be turned into a purchase order and sent for approval. The way this is handled is that the initial request sets up a session including a URL to a customer-internal service that's intended to handle the transaction. When the user completes checkout, a page is returned to the user containing an XML payload, and script to submit that XML to the specified internal service URL. That way, the store is able to provide the PO data to what is otherwise a completely internal system.




Which can all be handled using an (automated) whitelist, à la CORS.

Too many things run on localhost (or intranet) and assume that localhost=safe. I know, "that's wrong" and "don't listen on 127.0.0.1" and all that, but that horse has left the barn, emigrated, founded a family and died happy. We can't put the 127/192/10 genie back in the bottle.

Prevent access to all private resources from the outside and whitelist on a need-to-access basis. Or be ready to keep monkey patching your system against these exploits forever.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: