Uploaded image for project: 'Tapestry'
  1. Tapestry
  2. TAPESTRY-1397

Secure integrated JSON functionality from JavaScript Hijacking

    XMLWordPrintableJSON

Details

    • Task
    • Status: Open
    • Major
    • Resolution: Unresolved
    • 4.1.2, 4.2
    • 4.2
    • JavaScript
    • None

    Description

      See

      http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf

      for details and simple solution options.

      The security document indicates the Dojo project is already looking into the issue, so some coordination is probably in order, but I wanted to add an issue to track progress and thinking.

      The reccomendation to include the session cookie if available in all JSON requests, and validate it on the server, is something Tapestry could incorporate easily. If there is a JSESSIONID cookie on the page generating the request, use it, otherwise send a "no-session" value. The server would then check to see if there really was no session, or if the parameter matched the current request's sesison.

      Also, the client-side suggestion of munging the response JS so it needs modification before execution is a good one. This is probably where Dojo changes would fit in. Personally, I like the infinite while loop suggestion, but that's just spite

      Attachments

        Activity

          People

            Unassigned Unassigned
            gwoolsey Greg Woolsey
            Votes:
            1 Vote for this issue
            Watchers:
            1 Start watching this issue

            Dates

              Created:
              Updated: