On 1/30/06 1:09 PM, "Kenneth R. van Wyk" <[EMAIL PROTECTED]> wrote:

> Any AJAX experts here want to comment on the eWeek article cited below?
> 
> http://www.eweek.com/article2/0,1895,1916673,00.asp
> 
> It claims, among other things that, "AJAX dramatically increases the amount of
> XML network traffic being transmitted, exposing applications to Web services
> vulnerabilities".
> 
> Cheers,
> 
> Ken van Wyk

AJAX bothers me strongly for none of the reasons mentioned, which are
"curiously" limited to the capabilities of the "solution" from the same
source as the alert.  AJAX:

- Forces people to open their browsers to potentially malicious client-side
scripts from other sites, unless users actively manage their IE zones (I've
rarely found people who even know how to use them) or use something like the
NoScript firefox extension (and even then it needs better SSL support as it
depends and trusts DNS unless you specify the fully-qualified url).
JavaScript is a notorious attack vector.  I have the same issue with Windows
Media Player 10 (the internet radio part requires JavaScript to work) and
any site that forces visitors to use JavaScript to access content.
Requiring JavaScript is unconscionable, security-wise, in my opinion.

- Tempts software developers to assume that it's their code that is running
on the client, and trust it with input validation, access control, and
sensitive values.  This is a repeated, typical mistake in client-side
scripting.  Why tempt people into doing stupid things?

Cheers,
Pascal


_______________________________________________
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php

Reply via email to