javascript - Facebook JS SDK: access_token in plain text and security -


when user logs facebook using popup displayed fb.login() call, js sdk plants domain cookie containing oauth access_token in plain text. then, cookie being sent server every subsequent request - , it's pretty obvious not every request uses https.

isn't security problem? if so, how solve it?

an attacker, able sniff network traffic (e. g. wireless lan), can read cookie. , pretend person created for.

this not issue because same attack works on facebook pages itself: username/password - authentication done via https. following pages use unencrypted http, contain cookie.

there easy-to-use firefox extension allows steeling of cookies, if able sniff network traffic: http://codebutler.com/firesheep

ps: stackoverflow.com vulnerable, too.


Comments

Popular posts from this blog

asp.net - repeatedly call AddImageUrl(url) to assemble pdf document -

java - Android recognize cell phone with keyboard or not? -

iphone - How would you achieve a LED Scrolling effect? -