javascript - Facebook JS SDK: access_token in plain text and security -
when user logs facebook using popup displayed fb.login()
call, js sdk plants domain cookie containing oauth access_token in plain text. then, cookie being sent server every subsequent request - , it's pretty obvious not every request uses https
.
isn't security problem? if so, how solve it?
an attacker, able sniff network traffic (e. g. wireless lan), can read cookie. , pretend person created for.
this not issue because same attack works on facebook pages itself: username/password - authentication done via https. following pages use unencrypted http, contain cookie.
there easy-to-use firefox extension allows steeling of cookies, if able sniff network traffic: http://codebutler.com/firesheep
ps: stackoverflow.com vulnerable, too.
Comments
Post a Comment