while(1) in front of the json resposne
attacker could use <script src="http://remote.com/data.json"></script> to get the remote json data using victim's session id and get the json data using following code, modern browser won't allow this any more:
var captured = []; Object.prototype.__defineSetter__('model', function (str) { captured.push(str); });this is called JSON hijacking. appending while(1) in front of the json response. The attacker own't be able to get past the first line if the data is loaded using a <script> tag, because the browser will freeze while running the loop.
沒有留言:
張貼留言