Zoom, CORS, and the Web
The recent major Zoom vulnerability, ironically, stemmed from web technologies rather than the app itself. This highlights the complexities of integrating web and native app components.
The issue revolves around custom protocols (like gittower://
or dropbox://
) and how native apps register them to handle specific URLs. While effective in directly launching apps, they offer no user choice. To provide this choice, developers often use standard URLs instead.
Many apps achieve native app interaction from a webpage by using a localhost server on the user's machine, communicating via a URL scheme. This approach, while clever, raises concerns:
- Users may be unaware of the running localhost server.
- The ability of external websites to communicate with a localhost server feels intrusive.
However, safeguards exist, primarily CORS (Cross-Origin Resource Sharing). CORS prevents unauthorized cross-domain XHR requests, a crucial security measure. It's not a replacement for the browser's same-origin policy, but rather a mechanism to control cross-origin access. A website attempting to communicate with another website will fail unless the response includes an Access-Control-Allow-Origin
header matching the requesting domain or using a wildcard (*). Importantly, this restriction doesn't apply to all resources; images, for instance, are exempt.
According to Chris Foster, a misunderstanding of CORS was central to the Zoom vulnerability. To bypass CORS restrictions on AJAX requests, Zoom allegedly employed an image-based workaround. This inadvertently created a significant vulnerability, allowing any website to trigger actions within the native client and access its responses.
Nicolas Bailly's article, "What you should know about CORS," clarifies the often-misunderstood nature of CORS: it's not a security measure itself but a way to bypass the same-origin policy, which is the primary security mechanism.
The above is the detailed content of Zoom, CORS, and the Web. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

It's out! Congrats to the Vue team for getting it done, I know it was a massive effort and a long time coming. All new docs, as well.

I had someone write in with this very legit question. Lea just blogged about how you can get valid CSS properties themselves from the browser. That's like this.

I'd say "website" fits better than "mobile app" but I like this framing from Max Lynch:

The other day, I spotted this particularly lovely bit from Corey Ginnivan’s website where a collection of cards stack on top of one another as you scroll.

If we need to show documentation to the user directly in the WordPress editor, what is the best way to do it?

There are a number of these desktop apps where the goal is showing your site at different dimensions all at the same time. So you can, for example, be writing

CSS Grid is a collection of properties designed to make layout easier than it’s ever been. Like anything, there's a bit of a learning curve, but Grid is

Questions about purple slash areas in Flex layouts When using Flex layouts, you may encounter some confusing phenomena, such as in the developer tools (d...
