Home / Vulnerability Database / C-sharp : Unsafe JavaScript framework
C#
C-sharp : Unsafe JavaScript framework
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP MASVS
PCI DSS 4.0
HIPAA
Overview
The application uses Ajax framework that opens access to valuable data for attackers when used incorrectly.
Microsoft AJAX.NET uses JSON for data exchange between client and server. The framework generates responses containing valid JavaScript code that can be executed within the <script> tag. This may lead to JavaScript hijacking attacks.
Although the default AJAX.NET uses POST requests, which complicates the task of creating a malicious request from the <script> tag, the framework also contains mechanisms for work with GET requests. Moreover, many sources recommend using exectly GET requests to improve performance due to browser caching.
LOW
DerScanner Severity Score
Do you want to fix C-sharp : Unsafe JavaScript framework in your application?
See also
C#
C-sharp : JWT: None Algorithm
C#
C-sharp : Insecure data transmission: Database
C#
