Yes, you must watch out for cross-site scripting (XSS) attacks. This is when
a malicious user injects script into your info window (or other) content,
for example to steal the viewer's cookie. The solution is to ensure you
HTML-escape user input at the point of constructing your info window HTML.

BenBen
On Feb 25, 2011 4:03 AM, "Joseph Elfelt" <josephelf...@gmail.com> wrote:
> There are all kinds of Google map apps that get user input from
> somewhere and display that input in an infowindow when a marker is
> clicked.
>
> As developers, do we need to be concerned that a malicious person will
> provide data to be displayed in an infowindow which will cause
> something bad to happen when that infowindow is displayed?
>
> If so, what kinds of attacks do we need to guard against?
>
> --
> You received this message because you are subscribed to the Google Groups
"Google Maps JavaScript API v3" group.
> To post to this group, send email to
google-maps-js-api-v3@googlegroups.com.
> To unsubscribe from this group, send email to
google-maps-js-api-v3+unsubscr...@googlegroups.com.
> For more options, visit this group at
http://groups.google.com/group/google-maps-js-api-v3?hl=en.
>

-- 
You received this message because you are subscribed to the Google Groups 
"Google Maps JavaScript API v3" group.
To post to this group, send email to google-maps-js-api-v3@googlegroups.com.
To unsubscribe from this group, send email to 
google-maps-js-api-v3+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/google-maps-js-api-v3?hl=en.

Reply via email to