TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Bypassing AngularJS Sandbox and winning a $5,000 Google bug bounty

5 点作者 2510c39011c5超过 10 年前

1 comment

Nitramp超过 10 年前
That&#x27;s a nice exploit. It&#x27;s worth noting that this is only breaching Angular&#x27;s defense in depth though: input values should never make it to things evaluated against $scope; that&#x27;s roughly equivalent of calling eval() on user input.<p>AngularJS tries to protect developers against the worst, but it&#x27;s the second layer of a defense in depth - this should never happen in the first place in a well written app.