一区二区三区日韩精品-日韩经典一区二区三区-五月激情综合丁香婷婷-欧美精品中文字幕专区

分享

The security risk in Web 2.0 | CNET News.com (1)

 agile05 2007-06-11

The security risk in Web 2.0

Security has become a no-brainer for desktop software, but the same doesn‘t hold true for the booming world of Web applications.
By Joris Evers
Staff Writer, CNET News.com
Published: July 28, 2006, 4:00 AM PDT

Web 2.0 is causing a splash as it stretches the boundaries of what Web sites can do. But in the rush to add features, security has become an afterthought, experts say.

The buzz around the new technology echoes the ‘90s Internet boom--complete with pricey conferences, plenty of start-ups, and innovative companies like MySpace.com and Writely being snapped up for big bucks. And the sense of deja vu goes even further for some experts. Just as in the early days of desktop software, they say, the development momentum is all about features--and protections are being neglected.

High Impact

What‘s new:

Security has been overlooked in the rush to adopt Web 2.0 features on sites, some experts say.

Bottom line:

While surfers can find some PC protection in security software, the burden is on developers to make sure they don‘t leave any loopholes for attackers.

More stories on this topic

"We‘re continuing to make the same mistakes by putting security last," said Billy Hoffman, lead engineer at Web security specialist SPI Dynamics. "People are buying into this hype and throwing together ideas for Web applications, but they are not thinking about security, and they are not realizing how badly they are exposing their users."

Yamanner, Samy and Spaceflash are among the higher-profile attacks that have surfaced online. The Yamanner worm targeted Yahoo Mail, harvesting e-mail addresses and forwarding itself to all contacts in a user‘s Yahoo address book. The Samy and Spaceflash worms both spread on MySpace, changing profiles on the hugely popular social-networking Web site.

Web 2.0 lacks a precise definition; it‘s used mainly as a catch-all term to cover Web sites that are more than just plain, static pages. Web 2.0 sites are more interactive, allowing people to tag photos posted online, for example. Unlike their predecessors, they deliver an experience more akin to using a desktop application.

One of the key enablers of the flashier Web sites is a programming technique known as AJAX, which stands for "Asynchronous JavaScript and XML." Google Maps, launched last year, was one of the first Web applications to showcase the benefits of AJAX development techniques to a broad audience, when it let people use a mouse to move a map image around the screen.

But AJAX doesn‘t just help make Web pages and sites more interactive. It could also provide ways for hackers to hit a Web server and to exploit sites in attacks on visitors, experts said.

"Think of it like a house," said Hoffman, who will give a presentation on AJAX security at next week‘s Black Hat security event in Las Vegas. "A traditional Web site is like a house with no windows and just a front door. An AJAX Web site is like a house with a ton of windows and a sliding door. You can put the biggest locks on your front and back doors, but I can still get in through a window."

A Web site based on the new programming techniques has a greater "attack surface" because it has many more interactions with the browser and may run JavaScript on the client PC, he noted. JavaScript is a scripting programming language popular on Web sites. In contrast, old-fashioned Web sites typically accept information through forms.

Cross-site scripting
AJAX also increases the possibility of so-called cross-site scripting flaws, which occur when the site developer doesn‘t properly code pages, experts said. An attacker can exploit this type of vulnerability to hijack user accounts, launch information-stealing phishing scams or even download malicious code onto users‘ computers, experts have said. Big-name Web companies such as Microsoft, eBay, Yahoo and Google have all experienced cross-site scripting flaws on their Web sites.

"I think it would be naïve for anyone to say that there are no security problems."
--Ryan Asleson, co-author, "Foundations of Ajax"

But cross-site scripting issues are only one risk. Other potential problems in AJAX code include race conditions, code correctness issues, object model violations, insecure randomness and poor error handling, said Brian Chess, chief scientist at Fortify Software, a maker of source-code analysis tools.

Such errors could expose people‘s data, let one user control another user‘s session, allow malicious code to run, or enable other attacks, Fortify said. The company‘s researchers found examples of all of these errors in sample AJAX code in a December analysis of "Foundations of Ajax," a how-to-book aimed at software developers.

"Since the code samples (in the book) are likely to be regarded as a best-practices guide, many software developers worldwide will learn insecure coding habits," Chess said.

Ryan Asleson, one of the authors of "Foundations of Ajax," said he had not heard of the alleged flaws in the sample code. However, he said, if those problems do exist, it is possible, because the code was kept as simple for a large audience. "We never intended the code that‘s in there to actually be production-ready code," he noted.

    本站是提供個人知識管理的網(wǎng)絡(luò)存儲空間,所有內(nèi)容均由用戶發(fā)布,不代表本站觀點。請注意甄別內(nèi)容中的聯(lián)系方式、誘導(dǎo)購買等信息,謹(jǐn)防詐騙。如發(fā)現(xiàn)有害或侵權(quán)內(nèi)容,請點擊一鍵舉報。
    轉(zhuǎn)藏 分享 獻花(0

    0條評論

    發(fā)表

    請遵守用戶 評論公約

    類似文章 更多

    国产成人综合亚洲欧美日韩| 91精品视频免费播放| 日韩人妻中文字幕精品| 国产一级不卡视频在线观看| 国产91色综合久久高清| 国产原创中文av在线播放| 午夜精品一区二区三区国产 | 国产又粗又猛又黄又爽视频免费| 黄男女激情一区二区三区| 中文字幕熟女人妻视频| 视频在线播放你懂的一区| 欧美日韩中国性生活视频| 这里只有九九热精品视频| 中国一区二区三区不卡| 深夜福利欲求不满的人妻| 午夜精品一区二区三区国产| 国产高清精品福利私拍| 国产精品一区二区成人在线| 91福利视频日本免费看看| 中文字幕中文字幕在线十八区 | 国产麻豆一区二区三区在| 欧美一级片日韩一级片| 精品日韩视频在线观看| 中国黄色色片色哟哟哟哟哟哟| 国产成人午夜av一区二区| 久久99一本色道亚洲精品| 嫩草国产福利视频一区二区| 国产免费一区二区不卡| 欧美成人免费视频午夜色| 国产av一区二区三区久久不卡| 日韩一级免费中文字幕视频 | 偷自拍亚洲欧美一区二页| 在线视频免费看你懂的| 高清免费在线不卡视频| 99久久精品一区二区国产| 国产中文字幕一二三区| 少妇激情在线免费观看| 日韩欧美综合在线播放| 精品一区二区三区免费看| 91人妻人人精品人人爽| 精品偷拍一区二区三区|