开发者

is javascript dynamic content adequate security against script kiddies?

开发者 https://www.devze.com 2023-02-25 22:11 出处:网络
on a site the user can enter an email ac开发者_开发知识库count to gain access.do not want this to be hacked by script kitties.

on a site the user can enter an email ac开发者_开发知识库count to gain access. do not want this to be hacked by script kitties.

the input items are generated by javascript and posted via ajax. do I need things like fuzzy word matches in this environment?


Any time you give some user the possibility to input something, every time your application expects some data from the users, those data can be forged.

No matter how your form is built : your webserver espects some data ; those form and data can be forged/faked ; so, you must be prepared for anything that could be sent to your application.


Still, you can add some levels of security, using, for example :

  • HTTPS so communications cannot be listened to
  • A nonce in your form, to make things harder when it comes to forging forms


I assume you mean adequate security against someone writing a script to fish for for valid e-mails using a brute-force style attack? If so then no, your presumption that "script kiddies" are incapable of either scripting a full-fledged browser instance that can execute your JavaScript content or determining what URL your AJAX ultimately submits to and then forging requests is false.

If you want to protect against these kinds of attacks, then the only effective way to do so is to add code on the server side. For instance, you could track the number of incorrect access attempts posted per IP address, and block requests (for like an hour or so) from any IP that posts more than, say, 10 invalid requests in a 5-minute time span. Then you are reasonably safe against this kind of attack until you come across someone with a million-IP bot-net and a grudge against your site.

Another form of protection is to send some random code from the server to the client that gets submitted back with the form (for instance, as a hidden field), and code the server so that ignores any form submits that do not include this code. This solution works best if you have some way of verifying that the user is trustworthy before you display the form (so it's not really useful in the context of a login form, but it could help secure any post-login forms that you may have). Otherwise it is not too hard for an attacker to compose a script that just grabs a code from your server, and includes it in a forged request.


JavaScript + Ajax forms are just a more fancy means of forms. It's still a request with post/get data so same security measures should be undertaken as per normal HTML form.

Wether you use Ajax or basic HTTP requests, don't send back data you don't want users to see either way. Don't offer services or functionality by means of JavaScript/Ajax you wouldn't offer by means of basic HTTP requests.

Script injection does not need an JavaScript/Ajax vulnerabilities, it just needs unsecure backend code that doesn't catch and eliminate code injections.

0

精彩评论

暂无评论...
验证码 换一张
取 消