Home / Vulnerability Database / Java : Unsafe JavaScript framework
Java

Java : Unsafe JavaScript framework

Overview

The application uses Ajax framework that opens access to valuable data for attackers when used incorrectly.

Framework Google Web Toolkit (GWT) uses JSON for data exchange between client and server. The framework generates responses containing valid JavaScript code that can be executed within the <script> tag. This may lead to JavaScript hijacking attacks.

Although the default GWT uses POST requests, which complicates the task of creating a malicious request from the <script> tag, the framework also contains mechanisms for work with GET requests. Moreover, many sources recommend using exectly GET requests to improve performance due to browser caching.

Similar considerations also apply to the Direct Web Remoting (DWR) framework 1.1.4 and earlier.

LOW

DerScanner Severity Score

Do you want to fix Java : Unsafe JavaScript framework in your application?

See also

Java

Java : Race condition

Java

Java : Text4Shell Vulnerability

Java

Java : JNI usage