-
Notifications
You must be signed in to change notification settings - Fork 373
Description
As it's attacker-controlled it can be used for cache-eviction or determining cookie size.
To quote @mikewest in https://bugs.chromium.org/p/chromium/issues/detail?id=959757 (it's worth reading this for some more relevant discussion):
As noted in https://github.com/xsleaks/xsleaks/wiki/Browser-Side-Channels#cache-and-error-events, servers will often behave in unexpected ways when presented with an overly-long
Refererheader. This is unfortunate, asRefereris one header whose length attackers generally retain control over when generatingno-corsrequests.Perhaps we can cap it to something reasonable? This would be conceptually similar to the cap in https://fetch.spec.whatwg.org/#cors-safelisted-request-header for CORS requests...
cc @whatwg/security