<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: chris-shiflett</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/chris-shiflett.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2009-04-12T12:33:48+00:00</updated><author><name>Simon Willison</name></author><entry><title>A rev="canonical" HTTP Header</title><link href="https://simonwillison.net/2009/Apr/12/chris/#atom-tag" rel="alternate"/><published>2009-04-12T12:33:48+00:00</published><updated>2009-04-12T12:33:48+00:00</updated><id>https://simonwillison.net/2009/Apr/12/chris/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://shiflett.org/blog/2009/apr/a-rev-canonical-http-header"&gt;A rev=&amp;quot;canonical&amp;quot; HTTP Header&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Chris Shiflett proposes optionally exposing rev=canonical information in an HTTP header, thus allowing sites to discover shorter URLs using just a HEAD request and removing the need to parse HTML. The pingback specification also uses this shortcut.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/chris-shiflett"&gt;chris-shiflett&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/head"&gt;head&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/headers"&gt;headers&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/http"&gt;http&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/pingback"&gt;pingback&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/revcanonical"&gt;revcanonical&lt;/a&gt;&lt;/p&gt;



</summary><category term="chris-shiflett"/><category term="head"/><category term="headers"/><category term="http"/><category term="pingback"/><category term="revcanonical"/></entry><entry><title>Twitter Don't Click Exploit</title><link href="https://simonwillison.net/2009/Feb/12/chris/#atom-tag" rel="alternate"/><published>2009-02-12T19:56:42+00:00</published><updated>2009-02-12T19:56:42+00:00</updated><id>https://simonwillison.net/2009/Feb/12/chris/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://shiflett.org/blog/2009/feb/twitter-dont-click-exploit"&gt;Twitter Don&amp;#x27;t Click Exploit&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Someone ran a successful ClickJacking exploit against Twitter users, using a transparent iframe holding the Twitter homepage with a status message fed in by a query string parameter. Thiss will definitely help raise awareness of ClickJacking! Twitter has now added framebusting JavaScript to prevent the exploit.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/chris-shiflett"&gt;chris-shiflett&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/clickjacking"&gt;clickjacking&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/framebusting"&gt;framebusting&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/javascript"&gt;javascript&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/twitter"&gt;twitter&lt;/a&gt;&lt;/p&gt;



</summary><category term="chris-shiflett"/><category term="clickjacking"/><category term="framebusting"/><category term="javascript"/><category term="security"/><category term="twitter"/></entry><entry><title>End of Life for PHP 4</title><link href="https://simonwillison.net/2008/Aug/8/chris/#atom-tag" rel="alternate"/><published>2008-08-08T23:32:49+00:00</published><updated>2008-08-08T23:32:49+00:00</updated><id>https://simonwillison.net/2008/Aug/8/chris/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://shiflett.org/blog/2008/aug/end-of-life-for-php-4"&gt;End of Life for PHP 4&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Apparently 8/8/8 marks the end of the line for PHP 4—no new releases, no support, not even security patches.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/chris-shiflett"&gt;chris-shiflett&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/php"&gt;php&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/php4"&gt;php4&lt;/a&gt;&lt;/p&gt;



</summary><category term="chris-shiflett"/><category term="php"/><category term="php4"/></entry><entry><title>CSRF Redirector</title><link href="https://simonwillison.net/2007/Jul/18/chris/#atom-tag" rel="alternate"/><published>2007-07-18T07:45:45+00:00</published><updated>2007-07-18T07:45:45+00:00</updated><id>https://simonwillison.net/2007/Jul/18/chris/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://shiflett.org/blog/2007/jul/csrf-redirector"&gt;CSRF Redirector&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Smart tool for testing CSRF vulnerabilities, by Chris Shiflett.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/chris-shiflett"&gt;chris-shiflett&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/csrf"&gt;csrf&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="chris-shiflett"/><category term="csrf"/><category term="security"/></entry><entry><title>Chris Shiflett: My Amazon Anniversary</title><link href="https://simonwillison.net/2007/Mar/16/chris/#atom-tag" rel="alternate"/><published>2007-03-16T10:16:03+00:00</published><updated>2007-03-16T10:16:03+00:00</updated><id>https://simonwillison.net/2007/Mar/16/chris/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://shiflett.org/blog/2007/mar/my-amazon-anniversary"&gt;Chris Shiflett: My Amazon Anniversary&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Chris Shiflett discloses an unfixed CSRF vulnerability in Amazon’s 1-Click feature that lets an attacker add items to your shopping basket—after reporting the vulnerability to Amazon a year ago!


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/amazon"&gt;amazon&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/chris-shiflett"&gt;chris-shiflett&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/csrf"&gt;csrf&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="amazon"/><category term="chris-shiflett"/><category term="csrf"/><category term="security"/></entry><entry><title>Chris Shiflett: Google XSS Example</title><link href="https://simonwillison.net/2005/Dec/24/chris/#atom-tag" rel="alternate"/><published>2005-12-24T17:21:42+00:00</published><updated>2005-12-24T17:21:42+00:00</updated><id>https://simonwillison.net/2005/Dec/24/chris/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://shiflett.org/archive/178"&gt;Chris Shiflett: Google XSS Example&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
UTF-7 is a nasty vector for XSS.

    &lt;p&gt;&lt;small&gt;&lt;/small&gt;Via &lt;a href="http://jeremy.zawodny.com/blog/"&gt;Jeremy Zawodny&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/chris-shiflett"&gt;chris-shiflett&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/google"&gt;google&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/xss"&gt;xss&lt;/a&gt;&lt;/p&gt;



</summary><category term="chris-shiflett"/><category term="google"/><category term="security"/><category term="xss"/></entry></feed>