Package: couchdb
Version: 0.10.0-1
Tags: upstream important

You cannot use a RESTful interface from a browser because it is open
to CSRF attacks.  Using an HttpOnly cookie is not sufficient because
some of our browsers do not support HttpOnly.

Furthermore, couchdb serves back Javascript contained in database
attachment back to the browser for execution, offering yet another
attack vector which also affects browsers with HttpOnly support.

This has already been reported upstream, not realizing that we've
shipped it in lenny (with no response from upstream so far):

http://mail-archives.apache.org/mod_mbox/couchdb-dev/201002.mbox/%3c87bpfz5t39....@mid.deneb.enyo.de%3e

But lenny is exposed in a rather different way; it does not seem to
offer any authentication at all.



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/873a12p6ug....@mid.deneb.enyo.de

Reply via email to