Hi malware fighters,
Cross-site scripting (XSS) for years has been the number one hole in websites, being reason enough for the Mozilla Foundation to develop a technology to fight this problem. In recent months the open-source developer has been working on Content Security Policy (CSP), that makes that sites can tell a browser what content is legit and what content is not. The browser so can ignore all content that is non-trusted or non-supported by that site. The owner of a website can set through CSP from which domains scripts are being allowed to run. The browser in it’s turn will only run those scripts that come from trusted websites, for which a withe-list is being kept.
To determine whether content is legit content or injected or adopted or obfuscated content, CSP demands that all JavaScript for a certain website is being loaded from an external file from an appointed trusted host. This gonna mean that all inline script, JavaScript and event-handling HTML attributes will be ignored. Only scripts that have been inserted via a script-tag and direct to a white-listed host the browser will execute. “We realize that this model is completely different from the present free model for the web”, according to Brandon Sterne, Mozilla’s Security Program Manager. The developer wishes to enroll CSP in phases so it can be implemented fully later this year. Polonus already has the CSP extension running in his Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1pre) Gecko/20090623 Shiretoko/3.5pre ID:20090623044415 source: http://people.mozilla.org/~bsterne/content-security-policy/content-security-policy.xpi
https://addons.mozilla.org/nl/firefox/addon/7478
More difficult
According to Sterne XSS-holes are really valuable for attackers and malcoders and these exploits are shared over the Internet as soon as they are found up. "Website-owners and web-admins now can relaz a bit more as they know the users are being protected, even if a XSS-bug may slip through. CSP can be configured in such a way that it informs the owners of websites if an attack is taking place. Further even users of older browser will benefit. “The final outcome will be it will be extremely difficult to run an XSS attack for a website that has implemented CSP. All known infection vectors for injecting malscripts will not function any longer and making a successful attack will be a great deal more difficult to perform.”
polonus