Dnb@lemmy.dbzer0.com to Technology@beehaw.orgEnglish · 4 months ago0.0.0.0 Day - 18 Yr Old Vulnerability Let Attackers Bypass All Browser Securitycybersecuritynews.comexternal-linkmessage-square17fedilinkarrow-up175arrow-down10
arrow-up175arrow-down1external-link0.0.0.0 Day - 18 Yr Old Vulnerability Let Attackers Bypass All Browser Securitycybersecuritynews.comDnb@lemmy.dbzer0.com to Technology@beehaw.orgEnglish · 4 months agomessage-square17fedilink
minus-squarefloofloof@lemmy.calinkfedilinkEnglisharrow-up26·edit-24 months agoIt keeps promising to, then goes off into more ChatGPT-style rambling. It’s a bad article. This one is more informative: https://www.oligo.security/blog/0-0-0-0-day-exploiting-localhost-apis-from-the-browser
minus-squareKissaki@beehaw.orglinkfedilinkEnglisharrow-up16·edit-24 months agonotably Windows is not impacted by this issue. quoting the main, critical part: Under public domain (.com), the browser sent the request to 0.0.0.0. The dummy server is listening on 127.0.0.1 (only on the loopback interface, not on all network interfaces). The server on localhost receives the request, processes it, and sends the response. The browser blocks the response content from propagating to Javascript due to CORS. This means public websites can access any open port on your host, without the ability to see the response.
It keeps promising to, then goes off into more ChatGPT-style rambling. It’s a bad article. This one is more informative:
https://www.oligo.security/blog/0-0-0-0-day-exploiting-localhost-apis-from-the-browser
notably
quoting the main, critical part: