--
______________________________________________________________________________
null - Spreading the right Information
null Mailing list charter: http://null.co.in/section/about/null_list_charter/
______________________________________________________________________________
Do you trust your hardware?
http://hardwear.io
---
You received this message because you are subscribed to the Google Groups "null" group.
To unsubscribe from this group and stop receiving emails from it, send an email to null-co-in+...@googlegroups.com.
Visit this group at https://groups.google.com/group/null-co-in.
For more options, visit https://groups.google.com/d/optout.
Hey,
Not related to your question. But from your explanation, it looks like it is also vulnerable to CSRF bypassing same-origin policy: https://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/
Thanks
Venkat
OK cool. But are you sure if it is this x-content-type-options header that is preventing the rosetto flash kind of vuln. AFAIK, this header is supported by only few browsers and only in certain cases. I don't think flash plugin obeys this header.
Thanks
Venkat