Infection Vectors In JUMP
Aditya K Sood Writes "This article clearly explain the infection vectors in the JSON Uniform Messaging Protocol.As we know definitively that JUMP uses mainly HTTP and a lightweight JSONrecord to edit number of web pages.This article explain the attack vectors in the protocol implementation where the infection can be occured.The infection here relates to the code specification ie implementing features in a rogue way. This makes the malicious attacker to inject the exploit code or infected scripts to get the work done.The article lay stress on the vectors where infection is possible."
Article Link: http://www.metaeye.org/articles/36#more-36
Comments
You can follow this conversation by subscribing to the comment feed for this post.
All Comments are Moderated and will be delayed!
Post a comment
Verify your Comment
Previewing your Comment
Posted by: |
This is only a preview. Your comment has not yet been posted.
The letters and numbers you entered did not match the image. Please try again.
As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.
Having trouble reading this image? View an alternate.