<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=ISWG_Open_Letters_to_Browsers</id>
		<title>ISWG Open Letters to Browsers - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=ISWG_Open_Letters_to_Browsers"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ISWG_Open_Letters_to_Browsers&amp;action=history"/>
		<updated>2026-05-07T05:42:54Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ISWG_Open_Letters_to_Browsers&amp;diff=54109&amp;oldid=prev</id>
		<title>Arshan: ISWG Open Letters to ISWG moved to ISWG Open Letters to Browsers: typo in title</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ISWG_Open_Letters_to_Browsers&amp;diff=54109&amp;oldid=prev"/>
				<updated>2009-02-12T14:48:50Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;a href=&quot;/index.php/ISWG_Open_Letters_to_ISWG&quot; class=&quot;mw-redirect&quot; title=&quot;ISWG Open Letters to ISWG&quot;&gt;ISWG Open Letters to ISWG&lt;/a&gt; moved to &lt;a href=&quot;/index.php/ISWG_Open_Letters_to_Browsers&quot; title=&quot;ISWG Open Letters to Browsers&quot;&gt;ISWG Open Letters to Browsers&lt;/a&gt;: typo in title&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 14:48, 12 February 2009&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan='2' style='text-align: center;' lang='en'&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>Arshan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ISWG_Open_Letters_to_Browsers&amp;diff=54108&amp;oldid=prev</id>
		<title>Arshan at 14:48, 12 February 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ISWG_Open_Letters_to_Browsers&amp;diff=54108&amp;oldid=prev"/>
				<updated>2009-02-12T14:48:24Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 14:48, 12 February 2009&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l10&quot; &gt;Line 10:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 10:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Thanks for your time,&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Thanks for your time,&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;OWASP Intrinsic Security Working Group&amp;gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;br?&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;OWASP Intrinsic Security Working Group&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;br&lt;/ins&gt;&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;http://www.owasp.org/&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;http://www.owasp.org/&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Arshan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ISWG_Open_Letters_to_Browsers&amp;diff=54107&amp;oldid=prev</id>
		<title>Arshan at 14:48, 12 February 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ISWG_Open_Letters_to_Browsers&amp;diff=54107&amp;oldid=prev"/>
				<updated>2009-02-12T14:48:04Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 14:48, 12 February 2009&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The OWASP Foundation is deeply concerned about the risk associated with increasingly useful and powerful browsers. We are seeking to support the browser vendors with research, resources, and ideas.&amp;#160; At our recent Summit in Portugal, OWASP's Intrinsic Security Working Group (ISWG) met to discuss the key security challenges in browsers.&amp;#160; The ISWG is a group of web application security specialists that contribute their time to OWASP to try to make the Internet a safer place.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The OWASP Foundation is deeply concerned about the risk associated with increasingly useful and powerful browsers. We are seeking to support the browser vendors with research, resources, and ideas.&amp;#160; At our recent Summit in Portugal, OWASP's Intrinsic Security Working Group (ISWG) met to discuss the key security challenges in browsers.&amp;#160; The ISWG is a group of web application security specialists that contribute their time to OWASP to try to make the Internet a safer place.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;We'd like to identify practical solutions to some of the security issues that could affect security of both browser users and organizations with web applications.&amp;#160; The following recommendations are some initial ideas we'd like to help get implemented. We selected these ideas as good starting points because they are either relatively simple to implement or they offer a great deal of protection.&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;We'd like to identify practical solutions to &lt;/del&gt;some of the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;security issues that could affect security of both browser users and organizations with web applications&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; The following recommendations &lt;/del&gt;are &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;some initial ideas we&lt;/del&gt;'&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;d like &lt;/del&gt;to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;help get implemented&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;We selected these ideas as good starting points because they are either relatively simple to implement &lt;/del&gt;or &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;they offer &lt;/del&gt;a &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;great deal of protection&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;The first protection the ISWG recommends browsers implement is the HTTPOnly flag. The majority of major browsers currently offer &lt;/ins&gt;some &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;level &lt;/ins&gt;of &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;protection when applications use &lt;/ins&gt;the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;HTTPOnly flag&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Unfortunately, because the implementations &lt;/ins&gt;are &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;not complete, it is still possible under certain circumstances to bypass the mechanism. When this flag is turned on, JavaScript should not be able to read or write to the cookie object in the page&lt;/ins&gt;'&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;s DOM. Also, it is possible &lt;/ins&gt;to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;read cookie data from XmlHttpRequest response data even with HTTPOnly on&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Ideally, no JavaScript could access &lt;/ins&gt;or &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;modify any cookie data from &lt;/ins&gt;a &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;cookie with the HTTPOnly flag&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;first &lt;/del&gt;protection the ISWG &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;recommends browsers implement &lt;/del&gt;is &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the HTTPOnly flag. The majority of major browsers currently offer some level of protection when applications use the HTTPOnly flag. Unfortunately, because the implementations are not complete, it &lt;/del&gt;is &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;still possible under certain circumstances &lt;/del&gt;to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;bypass the mechanism&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;When &lt;/del&gt;this &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;flag is turned on, JavaScript should not be able &lt;/del&gt;to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;read &lt;/del&gt;or &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;write to &lt;/del&gt;the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;cookie object &lt;/del&gt;in the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;page's DOM&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Also&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;it is possible to read cookie data from XmlHttpRequest response data even with HTTPOnly &lt;/del&gt;on&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;. Ideally, no JavaScript could access or modify any cookie data from a cookie &lt;/del&gt;with the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;HTTPOnly flag&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;second &lt;/ins&gt;protection the ISWG is &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;recommending &lt;/ins&gt;is to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;disable &amp;quot;autocomplete&amp;quot; features within cross-domain iframes&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Browser users utilize &lt;/ins&gt;this &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;feature so they don't have &lt;/ins&gt;to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;remember passwords for multiple sites &lt;/ins&gt;or &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;save themselves &lt;/ins&gt;the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;effort of repeatedly typing &lt;/ins&gt;in the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;same credentials&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;If a browser automatically populates a login form for a site the user trusts&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;an attacker can trick the user into clicking the &amp;quot;login&amp;quot; button and execute fully authenticated functionality &lt;/ins&gt;on &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;the attacker's behalf &lt;/ins&gt;with the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;victim's credentials&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;second &lt;/del&gt;protection the ISWG is recommending is to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;disable &lt;/del&gt;&amp;quot;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;autocomplete&lt;/del&gt;&amp;quot; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;features within cross-domain iframes&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Browser users utilize this feature so they don't have &lt;/del&gt;to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;remember passwords for multiple sites or save themselves &lt;/del&gt;the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;effort &lt;/del&gt;of &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;repeatedly typing in the same credentials&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;If a browser automatically populates a login form for a site &lt;/del&gt;the user &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;trusts&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;an attacker can trick &lt;/del&gt;the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;user into clicking the &amp;quot;login&amp;quot; button and execute fully authenticated functionality on the attacker's behalf with the victim's credentials&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;final &lt;/ins&gt;protection the ISWG is recommending is to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;implement of &lt;/ins&gt;&amp;quot;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;jail&lt;/ins&gt;&amp;quot; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;tags&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Jail tags could allow applications &lt;/ins&gt;to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;reliably mark pieces of &lt;/ins&gt;the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;page where untrusted user input appears without introducing any risk &lt;/ins&gt;of &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;cross-site scripting&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;The future of &lt;/ins&gt;the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;web is more inter-connectivity and more &lt;/ins&gt;user &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;content&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;so &lt;/ins&gt;the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;need for this type of protection is critical&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;The final protection the ISWG is recommending is to implement of &amp;quot;jail&amp;quot; tags. Jail tags could allow applications to reliably mark pieces of the page where untrusted user input appears without introducing any risk of cross-site scripting. The future of the web is more inter-connectivity and more user content, so the need for this type of protection is critical.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Thanks for your time,&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;br&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;OWASP Intrinsic Security Working Group&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;gt;br?&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Thanks for your time,&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;OWASP Intrinsic Security Working Group&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;http://www.owasp.org/&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;http://www.owasp.org/&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Arshan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ISWG_Open_Letters_to_Browsers&amp;diff=54106&amp;oldid=prev</id>
		<title>Arshan: putting 2nd edit of letter on site</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ISWG_Open_Letters_to_Browsers&amp;diff=54106&amp;oldid=prev"/>
				<updated>2009-02-12T14:46:07Z</updated>
		
		<summary type="html">&lt;p&gt;putting 2nd edit of letter on site&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;The OWASP Foundation is deeply concerned about the risk associated with increasingly useful and powerful browsers. We are seeking to support the browser vendors with research, resources, and ideas.  At our recent Summit in Portugal, OWASP's Intrinsic Security Working Group (ISWG) met to discuss the key security challenges in browsers.  The ISWG is a group of web application security specialists that contribute their time to OWASP to try to make the Internet a safer place.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We'd like to identify practical solutions to some of the security issues that could affect security of both browser users and organizations with web applications.  The following recommendations are some initial ideas we'd like to help get implemented. We selected these ideas as good starting points because they are either relatively simple to implement or they offer a great deal of protection.&lt;br /&gt;
&lt;br /&gt;
The first protection the ISWG recommends browsers implement is the HTTPOnly flag. The majority of major browsers currently offer some level of protection when applications use the HTTPOnly flag. Unfortunately, because the implementations are not complete, it is still possible under certain circumstances to bypass the mechanism. When this flag is turned on, JavaScript should not be able to read or write to the cookie object in the page's DOM. Also, it is possible to read cookie data from XmlHttpRequest response data even with HTTPOnly on. Ideally, no JavaScript could access or modify any cookie data from a cookie with the HTTPOnly flag.&lt;br /&gt;
&lt;br /&gt;
The second protection the ISWG is recommending is to disable &amp;quot;autocomplete&amp;quot; features within cross-domain iframes. Browser users utilize this feature so they don't have to remember passwords for multiple sites or save themselves the effort of repeatedly typing in the same credentials. If a browser automatically populates a login form for a site the user trusts, an attacker can trick the user into clicking the &amp;quot;login&amp;quot; button and execute fully authenticated functionality on the attacker's behalf with the victim's credentials.&lt;br /&gt;
&lt;br /&gt;
The final protection the ISWG is recommending is to implement of &amp;quot;jail&amp;quot; tags. Jail tags could allow applications to reliably mark pieces of the page where untrusted user input appears without introducing any risk of cross-site scripting. The future of the web is more inter-connectivity and more user content, so the need for this type of protection is critical.&lt;br /&gt;
&lt;br /&gt;
Thanks for your time,&lt;br /&gt;
OWASP Intrinsic Security Working Group&lt;br /&gt;
http://www.owasp.org/&lt;/div&gt;</summary>
		<author><name>Arshan</name></author>	</entry>

	</feed>