On Sun, Jun 13, 2010 at 11:20 AM, Evan Gilbert <uid...@google.com> wrote:
>
>>
>> Can you explain the XSS hole from parsing a random JSON string?
>
> Naive processor calls:
> var href = document.location.href;
> var jsonBlob = href.substring(href.indexOf('#'), href.length)
> var userData  = eval(jsonBlob);
> This code would allow executing arbitrary code by sending a user a link,
> which could, for example, steal your cookies on a site.
> The fix is just a really complicated RegEx match
I don't agree with this assessment. The fix is to use json2.js from
json.org (which does indeed use a really complicated regex) if there
is no global JSON object available in the browser. A global JSON
object is available in IE8+, Firefox 3.5+, Safari 4.0.x+, and Chrome
and Opera (don't have the versions handy).

"Skate to where the puck is going, not to where it is." -- Wayne Gretzky

-- 

Robert Sayre

"I would have written a shorter letter, but I did not have the time."
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to