I just read the paper and, correct me if I'm wrong, this vulnerability
*only* applies to JSON. XML is safe, because it has to be parsed
before the data can be extracted. I avoid JSON because I don't like to
have eval() statements in my code. This would seem a more obvious
solution to the problem than the one proposed.

Chris

Reply via email to