The vulnerability in the Direct Web Reporting component of the AJAX development framework is probably the first server-side-based vulnerability to be identified, according to Imperva, which has issued guidance on a workaround that would let application programmers close the hole.
“It’s an access-control vulnerability,” says Amichai Shulman, CTO at Imperva. The flaw, as described online by Imperva’s Application Defense Center group, would let an attacker break into back-end databases and servers or launch a denial-of-service-attack. Imperva noted that the AJAX Web application development framework is “emerging as the lingua franca for building new generation Web 2.0 applications” such as Google Maps.
“We will see more and more of these vulnerabilities in the server-side framework,” Shulman predicts. He says for now, it’s the responsibility of application programmers to correct the flaw identified by Imperva, which may impact their applications.
Learn more about this topicImperva’s advisory on the DWR vulnerability
01/03/07AJAX accelerates Web applications
01/16/06AJAX presents corporate problems, opportunities