-
Book Overview & Buying
-
Table Of Contents
The Web Application Hacker's Handbook
By :
This chapter and the preceding one have described numerous examples of how the same-origin policy is applied to HTML and JavaScript, and ways in which it can be circumvented via application bugs and browser quirks. To understand more fully the consequences of the same-origin policy for web application security, this section examines some further contexts in which the policy applies and how certain cross-domain attacks can arise in those contexts.
The browser extension technologies that are widely deployed all implement segregation between domains in a way that is derived from the same basic principles as the main browser same-origin policy. However, some unique features exist in each case that can enable cross-domain attacks in some situations.
Flash objects have their origin determined by the domain of the URL from which the object is loaded, not the URL of the HTML page...
Change the font size
Change margin width
Change background colour