Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    AJAX Vulnerabilities Could Pose Serious Risks

    Written by

    Matt Hines
    Published August 3, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      LAS VEGAS—AJAX technology is rapidly being adopted by online businesses to help boost the interactivity of their Web sites, but a long list of potential vulnerabilities introduced by inexperienced programmers could create a troubling security landscape for Web 2.0 technologies.

      Speaking at the ongoing Black Hat security conference being held here July 31 – Aug. 3, Billy Hoffman, lead research engineer in the labs division of Atlanta-based security software maker SPI Dynamics, outlined a range of shortcomings he sees in the current development process for most common AJAX (Asynchronous JavaScript and XML) applications.

      AJAX is an extension to the JavaScript programming language that is used to improve the responsiveness of Web sites by automating the exchange of information between browsing software and sites back-end Web servers.

      For instance, the technology can allow a Webmail site to automatically download messages into a users inbox without requiring the individual to refresh their browser screen. Well-known sites such as Google Maps, Yahoo and MySpace already employ AJAX tools in a number of ways.

      Hoffman maintains that the current push by businesses to add AJAX tools to improve their sites and Web applications could create a slew of serious vulnerabilities, as inexperienced developers fail to properly protect their work and attackers learn to use the benefits of AJAX to their advantage.

      “AJAX applications have a huge attack surface, much larger than traditional applications,” Hoffman said. “And the buzz around AJAX is creating immense security implications, as the available knowledge bases and types of resources available for developers are poor.”

      /zimages/4/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      As more programmers begin to work with AJAX, there will be an opportunity for hackers to launch a range of serious threats against sites with insufficient defenses in place, according to Hoffman.

      The Yamanner virus that struck Yahoos Webmail system and the Samy worm attack that targeted users of the popular MySpace social networking site reflect the types of attacks that Hoffman said he believes will be more prevalent in the years to come as AJAX becomes more pervasive.

      Whereas the data used in more traditional Web applications exists largely on back-end servers, AJAX extends programs across both the client device and the server, creating far more opportunities for hackers to deliver malware onto sites. While a traditional online form requires users to hit submit to transmit all of their information to a Web site, creating a single communication that could be targeted by malware programs, an AJAX-enabled form that automatically relays the data from each field as data is entered will launch multiple transmissions that virus writers can latch into, Hoffman said.

      By exploiting shortcomings in AJAX programmers work, hackers may also be able to gain access to Web applications themselves and wreak havoc with online businesses.

      “Now [an attacker] is inside your application and can create a pipeline that allows them to see all the function names, variables and parameters of your site,” Hoffman said.

      /zimages/4/28571.gifClick here to read more about the new security threats posed by use of AJAX scripting.

      AJAX could also serve to amplify the potential of so-called cross-site scripting attacks, which seek to inject code onto legitimate Web sites in order to mislead users and steal their information. So-called screen-scraping attacks and Web session hijacking attempts, both of which also seek to steal users data, could also be performed more easily by taking advantage of AJAX. By allowing attackers to utilize the behind-the-scenes nature of the technology to escalate their threats by requesting multiple streams of data from sites, outsiders could garner even greater levels of information, Hoffman said.

      “AJAX is already present in every modern browser, and it has nothing to do with the Web server, thats part of the reason its so bad,” he said. “Even though AJAX says youre only allowed to talk back to a host, thats still a problem, as it can be used to amplify scripting on a site; short of two-factor authentication, it can get through any log-in sequence.”

      Hoffman directly criticized publishers of AJAX development manuals, who he said are adding to the problem by failing to warn programmers how to protect their work adequately. Inexperienced AJAX programmers use of widely available AJAX code in their own programs, a common practice, will create even more problems, he said.

      Black Hat attendees appeared impressed by the presentation, which included an example of an AJAX attack Hoffman discovered in the wild that targets Microsofts Atlas development tool kit.

      Andrew van der Stock, a security architect at National Australia Bank, based in Melbourne, Australia, said the threats posed by improper use of AJAX likely wont discourage companies from aggressively adopting the technology until major attacks take down popular Web sites and businesses come to understand the potential impact on their bottom lines.

      “It will take a number of serious worm attacks on big sites for people to get the message. Customers love AJAX so theres a lot of demand right now,” van der Stock said. “Adoption wont slow down and most AJAX developers dont know anything about security.”

      Other attendees observed that it will take time for awareness of AJAX security issues to become more widely recognized, but said most of the issues touched upon in the session could be easily eliminated once discovered.

      “Programming over the Web will require due diligence, but the fixes are fairly simple and easily analyzed,” said Chris Hoffman, director of special projects for browser maker Mozilla, in Mountain View, Calif. “The delivery mechanism for fixing the problems is also much faster than client software, and there are other security advantages to AJAX as well.”

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Matt Hines
      Matt Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.