TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Anatomy of a Subtle JSON Vulnerability (2008)

3 点作者 mck-超过 11 年前

1 comment

rk17超过 11 年前
How about simply adding an additional certificate - e.g. random string of specified length - held by your webapp in closure? And then configure your server to only respond to requests that have the &quot;secure&quot; httpOnly cookies and the certificate included using the POST method. The certificate was originally sent by the server using https protocol during document load, is stored in closure, and can be dynamically updated asynchronously over https connection.<p>This limits all requests to ajax requests since inclusion of this additional certificate is needed from javascript memory, but it does side-step the problem.<p>Ps: I know this is a dated article, I&#x27;m just curious what you guys think of this work-around. I think it&#x27;s more secure and flexible than the work-arounds suggested in the article, since this does allow you to use the array notation.