I would like to say a few thing here so everybody knows my statement. Finding vulnerabilities in public websites is wrong. What Stefan did was totally unethical. In fact, it is considered illegal. Some of you may say that it is just a simple XSS, but I've seen cases where simple XSS attacks can result into the backend going nuts and the entire system falling apart. You should not test public websites unless you have a permission to.
Second, the vulnerability within the CSRF redirector is simple and stupid. Ok, we screwed up. We fixed it and now we are moving on. We have some great projects to release and this is where I am going to concentrate my energy personally.
Thanks Ronald for supporting this statement all along. Oh, and thanks to Stefan for pointing out the vulnerability. Given the project load that we have at the moment for sure we would have missed it. BTW, things like this have happened before and we are open about it. Check this out: [
www.gnucitizen.org].
:) peace, btw if you are interested in winning an XSS Book, keep up with the GC blog.