The Internet Archive and the Digital Public Library of America (DPLA) are pleased to announce a joint collaborative program to enhance sharing of collections from the Internet Archive in the Digital Public Library of America (DPLA).
The Internet Archive will work with interested libraries and content providers to help ensure their metadata meets DPLA’s standards and requirements. After their content is digitized, the metadata would then be ready for ingestion into the DPLA if the content provider has a current DPLA provider agreement.
The DPLA is excited to collaborate with the Internet Archive in this effort to improve metadata quality overall, by making it more consistent with DPLA requirements, including consistent rights statements. Better data means better access. In addition to providing DPLA compliant metadata services, the Internet Archive also offers a spectrum of digital collection services, such as digitization, storage and preservation. Libraries, archives and museums who chose Internet Archive as their service provider have the added benefit of having their content made globally available through Internet Archive’s award winning portals, OpenLibrary.org and Archive.org.
“We are thrilled to be working with the DPLA”, states Robert Miller, Internet Archive General Manager of Digital Libraries. “With their emphasis on providing not only a portal and a platform, but also their advocacy for public access of content, they are a perfect partner for us”.
Rachel Frick, DPLA Business Development Director says, “The Internet Archive’s mission of ‘Universal Access to All Knowledge’, coupled with their end-to-end digital library solutions complements our core values.”
In this post I will show why anti-CSRF tokens are useless as soon as there is an XSS vulnerability in the target site. This post contains all the example scripts necessary to reproduce bypassing CSRF protection via XSS vulnerabilities. The code is meant for educational purposes only.
- Basic Terms: CSRF and XSS
- PHP CSRF Example Script
- Basic CSRF via POST attack
- Introducing a XSS vulnerability
- Bypass CSRF Protection via XSS
- Bypass CSRF Protection without XSS
- Conclusion on CSRF and the Dangers of XSS
Basic Terms: CSRF and XSS
CSRF means Cross-Site Request Forgery. The idea is to get a user that is logged in at a website to perform actions on that site they do not actually want to perform. This can be achieved by getting the victim to visit a website (possibly – but not necessarily – owned by the attacker) that contains specially crafted HTML code created by the attacker. CSRF is possible with POST as well as GET requests (although as per REST, GET requests shouldn’t actually change data on the server).
Anti-CSRF token is the recommended way to prevent CSRF. A one time token is stored in the session as well as the form when creating it, and when the form is submitted, the submitted token is compared to the session token. If they match, there is no CSRF attack.
We are glad to announce the release of EMPS 2.4 stack, the backbone for Webuzo Control Panel which comprises of updated NGINX – Perl – PHP system applications to favor smooth control of the Webuzo Control Panel.
Updated Applications and versions
1) OpenSSL : 1.0.1l
2) PHP : 5.5.22
Note : New Installations will automatically fetch EMPS 2.4 stack during the installation process.
Existing Users can refer to the following guide to update their EMPS Stack.
Support : http://webuzo.com/support