If I recall correctly, this was done to help address information leakage. Meaning if you're logged into a web application and also visiting a page on another website, that other page could have a script tag pointing at your web application, resulting in that data being added to the page scope, which other scripts on that page could then read. Having the resulting json data wrapped in a comment prevents that data from being automatically executed by the browser and added to scope, but doesn't prevent valid XHR requests (which enforce the same-host policy) from getting the result, stripping off a few characters and the exec'ing to get the data.

So by "resolving" this "issue" you've just made all apps built on top of it less secure.

-Dale

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@struts.apache.org
For additional commands, e-mail: dev-h...@struts.apache.org

Reply via email to