Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • SEARCH
  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 6170487
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 23, 20262026-05-23T23:02:38+00:00 2026-05-23T23:02:38+00:00

Ok, so I’m developing a web app that has begun to be more ajaxified.

  • 0

Ok, so I’m developing a web app that has begun to be more ajaxified. I then read a blog that talked about javascript hijacking, and I’m a little confused about when it’s actually a problem. I want some clarification

Question 1:
Is this the problem/vulnerability?

If my site returns json data with a ‘GET’ request that has sensitive
information then that information can get into the wrong hands.

I use ASP.NET MVC and the method that returns JSON requires you to explicitly allow json get requests. I’m guessing that they are trying to save the uninitiated from this security vulnerability.

Question 2:
Does the hijacking occur by sniffing/reading the response as it’s being sent through the internet? Does SSL mitigate that attack?

Question 3:
This led me to ask this question to myself. If I’m storing page state in local javascript object(s) of the page, can someone hijack that data(other than the logged in user)?

Question 4:
Can I safely mitigate against THIS vulnerability by only returning JSON with a ‘POST’ request?

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-23T23:02:40+00:00Added an answer on May 23, 2026 at 11:02 pm

    The post you linked to is talking about CSRF & XSS (see my comment on the question), so in that context:

    Is this the problem/vulnerabiliy (“If my site returns json data with a ‘GET’ request that has sensitive information then that information can get into the wrong hands.”)?

    No.

    Does the hijacking occur by sniffing/reading the response as it’s being sent through the internet?

    No.

    If I’m storing page state in local javascript object(s) of the page, can someone hijack that data(other than the logged in user)?

    It depends. It depends on whether you’re storing the data in cookies and haven’t set the right domain, or path. It depends on whether there’s a security vulnerability on the client browser that would allow a script to gain access to data that typically is restricted. There are numerous other vectors of attack, and new ones are discovered all the time. The long and the short of it is: don’t trust the browser with any confidential or secure data.

    Can I safely mitigate against THIS vulnerability by only returning JSON with a ‘POST’ request?

    No (it’s not a single vulnerability, it’s a set of classes of vulnerabilities).

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Related Questions

That's pretty much it. I'm using Nokogiri to scrape a web page what has
I'm parsing an RSS feed that has an ’ in it. SimpleXML turns this
link Im having trouble converting the html entites into html characters, (&# 8217;) i
Seemingly simple, but I cannot find anything relevant on the web. What is the
I want to count how many characters a certain string has in PHP, but
I have a French site that I want to parse, but am running into
We're building an app, our first using Rails 3, and we're having to build
Does anyone know how can I replace this 2 symbol below from the string
this is what i have right now Drawing an RSS feed into the php,
I'm trying to decode HTML entries from here NYTimes.com and I cannot figure out

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.