• tal@lemmy.today
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    8 hours ago

    It sounds like, from other articles, Chrome at least is blocking access to the local machine from non-local pages, which seems very much desirable.

    Blocking access to the local machine across-the-board would be problematic, since one might want to browse stuff served by a local webserver.

    I’d also add that I’ve been around network security for some time, have gone through a bunch of the RFCs and know some odd IPv4 addressing quirks – I can tell you that 0177.0x1 will reach localhost – but didn’t know that a packet addressed to 0.0.0.0 would go to localhost. From another article, it sounds like other addresses that reach localhost had been blocked a long time ago.

  • Zachariah@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    9 hours ago

    Oligo Researchers have found that public websites (like domains ending in .com) are able to communicate with services running on the local network (localhost) and potentially execute arbitrary code on the visitor’s host by using the address 0.0.0.0 instead of localhost/127.0.0.1.

    Remediation In Progress: Browsers Will Soon Block 0.0.0.0

    Following responsible disclosure, HTTP requests to 0.0.0.0 are now being added to security standards using a Request for Comment (RFC), and some browsers will soon block access to 0.0.0.0 completely. 0.0.0.0 will not be allowed as a target IP anymore in the Fetch specification, which defines how browsers should behave when doing HTTP requests.