Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • SEARCH
  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 891861
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 15, 20262026-05-15T13:57:25+00:00 2026-05-15T13:57:25+00:00

I’m currently building an web application for a customer that uses a rich client.

  • 0

I’m currently building an web application for a customer that uses a rich client. (Flex)

In this application, a user has a password, as well as a couple of other key attributes that are used throughout the system for identification purposes. (Eg., things like mothers maiden name).

A user logs on with their password initially. Then, throughout the application, whenever a user is about to perform a “destructive” action, they are required to enter one of these other identifying pieces of data.

My customer has requested I load these attributes after login, store them in memory, and perform validation against this data on the client, before making a server call that performs the destructive actions.

This strikes me as a potential security risk, as it’s possible (albeit difficult) to spoof the web client, and retrieve this data that is sent across the wire. My customer thinks I’m being paranoid and is urging me ahead.

Some key points to consider:

  • The application is served over HTTPS
  • All client / server communications occur over HTTPS
  • This data is sent to the client only AFTER logon has occurred
  • During logon, the session is issued with a secure cookie.

So, largely, the application is fairly secure.

However, my gut tells me that while it may be difficult to hack the data, it’s still less secure than if we didn’t send it at all, and validated on the server.

Am I being paranoid, or is this a genuine security risk?

If this is a valid concern, are there any best practice documents that I can point my client to, in order to substantiate my point?

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-15T13:57:26+00:00Added an answer on May 15, 2026 at 1:57 pm

    The check should be done on the server side.

    If an unauthorized person gets access to a session id, he can always make a call to server using the session id and download the personal attributes. That is leaking private information to an attacker.

    More importantly, the attacker doesn’t really care what validations you perform in your flex app. He will just use a network sniffer to see what server calls are being made – and since those server calls don’t require personal attributes, he can bypass your security model.

    In short, all security validations should be done on the server side. This is a Common Weakness, you can read more about it on this page http://cwe.mitre.org/data/definitions/602.html

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Related Questions

I'm parsing an RSS feed that has an ’ in it. SimpleXML turns this
That's pretty much it. I'm using Nokogiri to scrape a web page what has
I am currently running into a problem where an element is coming back from
I want use html5's new tag to play a wav file (currently only supported
link Im having trouble converting the html entites into html characters, (&# 8217;) i
Seemingly simple, but I cannot find anything relevant on the web. What is the
Does anyone know how can I replace this 2 symbol below from the string
this is what i have right now Drawing an RSS feed into the php,
We're building an app, our first using Rails 3, and we're having to build
I have this code: - (void)parser:(NSXMLParser *)parser foundCDATA:(NSData *)CDATABlock { NSString *someString = [[NSString

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.