« Microsoft, Hacker Attack XSS | Main | Exploiting JSON Framework : 7 Attack Shots »

Infection Vectors In JUMP

Aditya K Sood Writes "This article clearly explain the infection vectors in the JSON Uniform Messaging Protocol.As we know definitively that JUMP uses mainly HTTP and a lightweight JSONrecord to edit number of web pages.This article explain the attack vectors in the protocol implementation where the infection can be occured.The infection here relates to the code specification ie implementing features in a rogue way. This makes the malicious attacker to inject the exploit code or infected scripts to get the work done.The article lay stress on the vectors where infection is possible."

Article Link: http://www.metaeye.org/articles/36#more-36

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.


All Comments are Moderated and will be delayed!


Post a comment

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Working...
Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.

Working...







Remember personal info?