CAPEC-CAPEC-85 - CERT CVE
Naziv

AJAX Fingerprinting

Sažetak This attack utilizes the frequent client-server roundtrips in Ajax conversation to scan a system. While Ajax does not open up new vulnerabilities per se, it does optimize them from an attacker point of view. A common first step for an attacker is to footprint the target environment to understand what attacks will work. Since footprinting relies on enumeration, the conversational pattern of rapid, multiple requests and responses that are typical in Ajax applications enable an attacker to look for many vulnerabilities, well-known ports, network locations and so on. The knowledge gained through Ajax fingerprinting can be used to support other attacks, such as XSS.
Preduvjeti The user must allow JavaScript to execute in their browser
Rješenja ['Design: Use browser technologies that do not allow client side scripting.', 'Implementation: Perform input validation for all remote content.']