Ajax threats worry researchers
Black Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding frenzy among hackers.
Unfortunately, attackers have realized that Ajax-based applications are easily exploitable, paving the way for plenty of damage and financial gain.
The threat will only get worse and make life more difficult for IT security professionals, Billy Hoffman, lead research engineer with Atlanta-based SPI Dynamics Inc., warned Thursday during a presentation at Black Hat USA 2006. Companies are in a big hurry to add Ajax-based programs to their Web sites to increase functionality, which he said in turn leads to the development of Web applications that are haphazardly thrown together by inexperienced programmers.
"The buzz around Ajax is creating immense security implications, as the available knowledge bases and types of resources available for developers are poor," Hoffman said. "We are seeing bad design choices."
![]() |
||||
|
![]() |
|||
![]() |
Meanwhile, he said, Ajax applications offer attackers a larger attack surface to work with than traditional applications. Making matters worse, Web developers are doing a poor job of validating user input.
|
![]() |
||||||||||||||||
![]() |
Examples of the threat include JS.Yamanner, a JavaScript worm that spread through a Yahoo Mail flaw in June, and exploits that targeted the Windows Meta File (WMF) glitch Microsoft patched in January.
To stem the tide, he said, enterprises must carefully consider how they're deploying Ajax-based applications. Businesses need to consider what is to be gained from added functionality and whether it's really necessary in the short term. Those who feel it is need to make sure their developers have enough experience and are factoring security into the development process.
Andrew van der Stock, a Web application specialist with the National Australia Bank, said his organization is working toward eventually having Ajax-based Web applications, perhaps within the next six to 12 months.
"In the banking environment, there's a lot of pressure to use Ajax because the business side has concluded that it's [about] what the customer wants," he said. His organization though is heeding Hoffman's advice and proceeding with caution.
"We know we have to balance the need to have Ajax with the security risks, and we're working to make sure everyone [in the organization] knows the risks," he said. "We're working to ensure every field is validated correctly, and we're constantly looking for more know-how because we want to do this right. That's why I'm here."