Researchers point out the holes in NoScript's default whitelist

JMH

Emeritus, Contributor
Joined
Apr 2, 2012
Posts
7,197
Security researchers Linus Särud and Matthew Bryant hav recently discovered some pretty big holes in NoScript, a popular Firefox plugin that prevents executable web content such as JavaScript, Java, Flash, and other plugins to be loaded from sites users haven't designated as "trusted".

The vulnerabilities have been spotted in the plugin's whitelist, which is, by default, filled with some popular sites. Other sites can be added manually by the users themselves.

Bryant discovered that the whitelist automatically includes all subdomains (if they are not preceded by http(s)://) of the trusted domains. Also, after checking each default trusted domain he also discovered that one of them - zendcdn.net - had expired!
Researchers point out the holes in NoScript's default whitelist
 
That's interesting. I think I'll take it in consideration when recommending NoScript now.
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top