Scimyst
Subscribe
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    the ancient buddha statue for women is very beautiful but extremely vivid 119168

    Chilling Ancient Punishments for Women with Beautiful but Bloodied Names

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

  • Events
    • All
    • Science Stories
    • Scientific Projects

    Tonight announces the Ig Nobel Prize winners

    frog

    Frog Wins Ig Nobel Prize 2005

    canhcutIg

    Life is Not Lacking in Quirks

    Nobel Prize in Medicine 2005: A Modern Fairy Tale

    10 Weird Inventions Awarded the Ig Nobel Prize 2005

    nobelKT

    Why Did They Win the Nobel Prize in Economics?

    giaydientu

    “Electronic Paper” Set to Appear on the Market

    Development of Science and Technology in the South Central Coast and Central Highlands Provinces

    a russian scientist loves vietnam 1659

    A Russian Scientist Who Loves Vietnam

  • Lifestyle
    • All
    • Environment
    • Medicine & Health
    tdnong

    Global warming may be the cause of major storms

    traxanh1

    Green tea has effects against dementia

    Discovery of Cancer-Preventing Genes in the Human Body

    Khachdulich Indonesia

    Avian influenza harms tourism more than terrorism

    nao

    Lying – A Disease of People with Brain Defects

    cafe

    Coffee May Prevent Cancer

    tebaocum

    Recreating the ‘Death’ Flu Virus of 1918

    Indo ban

    The whole world unites to fight avian influenza

    HIV aids

    The Mystery of AIDS Epidemic

  • Technology
    • All
    • AI - Artificial Intelligence
    • Computer Science
    • New Technology
    • Scientific Inventions
    top apps explore space solar system on pc 98000

    Top Applications for Exploring the Universe and Solar System on PC

    vai dien tu 650

    Soon there will be data-transmitting clothing

    sua loi khong vao dc coc coc 650

    Why can’t Cốc Cốc download videos to the computer?

    may tinh cu 1

    17 Things You Can Do with an Old Computer

    play free games super fun on android devices 54708

    Play Extremely Fun Free Games on Android Devices

    top 10 best weather apps on android 98127

    Top 10 Best Astronomy Apps on Android

    how to charge iphone properly 122474

    How to Charge an iPhone the Right Way

    do not scan qr code finger 122198

    Don’t Scan QR Codes Randomly

    sensor technology for measuring oxygen in blood 120461

    Light-Emitting Sensor Technology Can Measure Blood Oxygen

  • Cultural Heritage
    ai cap 650

    The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

    khao co 650

    Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

    baroque churches philippines 67188

    Baroque Churches – Philippines

    mont saint michel france 67265

    Mont Saint Michel Island – France

    acropolis bracelet in athens greece 67621

    Acropolis Fortress in Athens – Greece

    language mo tan thuy hoang china 67087

    Tomb of Qin Shi Huang – China

    historical city ayutthaya 67804

    Historical City of Ayutthaya

    mesa verde national park 67201

    Mesa Verde National Park – United States of America

    to the taj mahal india 67153

    Taj Mahal Temple – India

  • Entertainment
    • All
    • Photo Library
    • Videos

    Honesty

    Telephone

    Advanced Technology

    Terminal Illness

    Allergy

    Love Like Mars

    Super Definition

    Coi Sách

    Selling Candy

No Result
View All Result
Scimyst
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    the ancient buddha statue for women is very beautiful but extremely vivid 119168

    Chilling Ancient Punishments for Women with Beautiful but Bloodied Names

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

  • Events
    • All
    • Science Stories
    • Scientific Projects

    Tonight announces the Ig Nobel Prize winners

    frog

    Frog Wins Ig Nobel Prize 2005

    canhcutIg

    Life is Not Lacking in Quirks

    Nobel Prize in Medicine 2005: A Modern Fairy Tale

    10 Weird Inventions Awarded the Ig Nobel Prize 2005

    nobelKT

    Why Did They Win the Nobel Prize in Economics?

    giaydientu

    “Electronic Paper” Set to Appear on the Market

    Development of Science and Technology in the South Central Coast and Central Highlands Provinces

    a russian scientist loves vietnam 1659

    A Russian Scientist Who Loves Vietnam

  • Lifestyle
    • All
    • Environment
    • Medicine & Health
    tdnong

    Global warming may be the cause of major storms

    traxanh1

    Green tea has effects against dementia

    Discovery of Cancer-Preventing Genes in the Human Body

    Khachdulich Indonesia

    Avian influenza harms tourism more than terrorism

    nao

    Lying – A Disease of People with Brain Defects

    cafe

    Coffee May Prevent Cancer

    tebaocum

    Recreating the ‘Death’ Flu Virus of 1918

    Indo ban

    The whole world unites to fight avian influenza

    HIV aids

    The Mystery of AIDS Epidemic

  • Technology
    • All
    • AI - Artificial Intelligence
    • Computer Science
    • New Technology
    • Scientific Inventions
    top apps explore space solar system on pc 98000

    Top Applications for Exploring the Universe and Solar System on PC

    vai dien tu 650

    Soon there will be data-transmitting clothing

    sua loi khong vao dc coc coc 650

    Why can’t Cốc Cốc download videos to the computer?

    may tinh cu 1

    17 Things You Can Do with an Old Computer

    play free games super fun on android devices 54708

    Play Extremely Fun Free Games on Android Devices

    top 10 best weather apps on android 98127

    Top 10 Best Astronomy Apps on Android

    how to charge iphone properly 122474

    How to Charge an iPhone the Right Way

    do not scan qr code finger 122198

    Don’t Scan QR Codes Randomly

    sensor technology for measuring oxygen in blood 120461

    Light-Emitting Sensor Technology Can Measure Blood Oxygen

  • Cultural Heritage
    ai cap 650

    The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

    khao co 650

    Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

    baroque churches philippines 67188

    Baroque Churches – Philippines

    mont saint michel france 67265

    Mont Saint Michel Island – France

    acropolis bracelet in athens greece 67621

    Acropolis Fortress in Athens – Greece

    language mo tan thuy hoang china 67087

    Tomb of Qin Shi Huang – China

    historical city ayutthaya 67804

    Historical City of Ayutthaya

    mesa verde national park 67201

    Mesa Verde National Park – United States of America

    to the taj mahal india 67153

    Taj Mahal Temple – India

  • Entertainment
    • All
    • Photo Library
    • Videos

    Honesty

    Telephone

    Advanced Technology

    Terminal Illness

    Allergy

    Love Like Mars

    Super Definition

    Coi Sách

    Selling Candy

No Result
View All Result
Scimyst
No Result
View All Result
Home Technology Computer Science

Fundamentals of Security in Ajax

by Sci
June 30, 2006
in Computer Science
0
Share on FacebookShare on Twitter

Ajax technology has been present on websites for many years due to its interactive capabilities. Google Suggest and Google Maps were two early applications of this technology. Today, companies are pondering how to leverage it, web designers are striving to learn from it, security experts are working to secure it, while penetration testers are considering how to hack it. Regardless, any new technique that can enhance server throughput, provide more flexible state transitions, and create richer web applications for users ultimately seeks to establish a foothold in the industry.

Ajax is seen as the next step in the “Web 2.0” generation. The purpose of this article is to introduce some fundamental security issues associated with modern Ajax web technology. With Ajax, applications can be challenging to test; therefore, security experts have prepared appropriate methods and necessary tools. We will discuss whether it’s time to say goodbye to traditional web applications in favor of Ajax, which could also mean welcoming new security vulnerabilities. Now, let’s briefly discuss the internal techniques of Ajax and examine how Ajax applications impact security.

Core of Ajax

Traditional web applications operate on a synchronous model, meaning that when a web request is made, it is accompanied by a response that performs some actions in the presentation layer. For instance, clicking a link or pressing a submit button generates a request to the web server with relevant parameters. This “click and wait” habit has limited the interactivity of applications. This issue is alleviated by using Ajax (Asynchronous JavaScript and XML). For the purposes of this article, I will consider Ajax primarily as an asynchronous calling method that interacts with the web server without refreshing the entire webpage. This type of interaction is made possible by three components: client-side scripting language, the XmlHttpRequest (XHR) object, and XML.

Let’s briefly discuss these components:

The client-side scripting language is used to initiate calls to the server, which are then used to access programs and update the DOM within the client’s browser. The most popular choice on the client-side is JavaScript due to its strong compatibility with various browsers. The second component is the XHR object, which is the true heart of this technique. Languages like JavaScript utilize the XHR object to send requests to the web server hidden behind the script and use HTTP as a transport medium. XML formats the data for the messages that can change.

Many sites use JSON (JavaScript Object Notation) instead of XML, as its syntax is easier. When using JavaScript to parse JSON, the process becomes significantly simpler. On the other hand, one can also use XPath to parse back into XML syntax. There are also many Ajax applications that do not use XML or JSON, opting instead to send dynamically inserted HTML fragments into the webpage.

As mentioned earlier, Ajax is not a brand-new technology; rather, it is a combination of pre-existing technologies brought together to develop highly interactive web applications. In fact, all the above components had already appeared before and were widely used with IE 5.0. Designers have introduced Ajax use cases such as “suggestive” textboxes and automatically refreshing data lists. All XHR requests are still processed by typical server-side frameworks similar to J2EE, .Net, and PHP. The asynchronous nature of Ajax applications is illustrated in the image below.

ey

Ajax Security

Having reviewed Ajax, let’s now discuss its security. Ajax does not introduce new security vulnerabilities in web applications. Instead, applications face the same security issues as traditional web applications. Unfortunately, the most common actions of Ajax have not been well-developed, leaving many areas with potential errors. This includes proper awareness, authorization, access control, and input validation. Some potential areas related to the use of Ajax are as follows:

* Client-Side Security Controls

Some may argue that the reliance on client-side programming brings about certain orientation issues. Such capabilities relate to the security of poorly designed client-side controls. As discussed in the previous section, the use cases for Ajax are quite limited for client scripting code. However, designers today are required to write both server-side and client-side code. Therefore, they may be drawn to focus on security controls on the client side. Clearly, the client side is not safe because attackers can alter any code running on their client machine. Consequently, security controls must be supplemented on the server or always enforced on the server.

* Increased Attack Surface

A second challenge related to complexity involves protecting the increased attack surface. Ajax certainly increases the complexity of all systems. During the Ajax implementation, designers may write code with a significant number of client-side pages, each performing a few small functions (in a large application). These small pages will become additional targets for attackers, thus introducing another point that needs to be secured to prevent new vulnerabilities from being introduced. This is similar to the known security concepts regarding the entrances of a house: the difficulty here lies in securing a house with one door compared to one with ten doors.

* Bridging Gaps Between Users and Services

Ajax provides users with friendlier interfaces through its direct service structure. The push to separate a pair of server-based structures is a promising idea with many benefits, especially in business environments. As more of these “endpoints” are developed, and as Ajax introduces the capability to push more sophisticated processing to users, the prospect of shifting away from the three-tier model will occur.

Overall, many web services within business systems (which contrast with the entire Internet) are designed for B2B (Business to Business), which is why designers and developers often do not anticipate real user interaction. This lack of foresight leads to a series of poor security assumptions throughout the design process. For instance, the initial designers assumed that awareness, empowerment, and input validity would be enforced at the middleware systems. Allowing “outsiders” to directly call these services via Ajax introduces an unwanted agent into the picture. A real-life example of such a scenario is a suitable link from Microsoft to use Atlas hand-in-hand with web services. Now, designers can write JavaScript to create XML input and correctly call web services from within the client’s browser. In the past, this was done through service delegation at the server.

(To be continued)

Pham Van Linh
Email:
[email protected]

Next Post
perfect lake throwing 6612

Perfect Lateral Passes

anti counterfeit technology datadot 6613

Counterfeit Prevention with Datadot Technology

handheld device helps blind read printed news 6614

Handheld device helps the blind read printed newspapers

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

FEATURED POST

the mystery of the mummified woman misidentified as an egyptian pharaoh 129359

The Mystery of the Mummy of the Woman Mistaken for the Pharaoh of Egypt

space monsters in mythology first appearance 129358

Cosmic Monster ‘in Legend’ Appears for the First Time

the most dangerous coastline in the world haunting the dreams of mangrove forests 108247

The world’s most dangerous strait – The haunting toll measured in sailors’ lives

10 amazing natural phenomena that challenge science 60818

23 Mysterious Natural Phenomena That Challenge Science

TRENDING

no cave no peak excluding china leaves the world amazed when building a bridge like a dragon flying over the river 136956
Scientific Discoveries

No Tunnels, No Supports: China Stuns the World with a Bridge that Floats like Silk on the River

nguoi ai cap co dai 650
Scientific Discoveries

What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

marie curie the most renowned female scientist in the world 1026
Science Stories

Marie Curie – The Most Renowned Female Scientist in the World

10 amazing natural phenomena that challenge science 60818
1001 Mysteries

23 Mysterious Natural Phenomena That Challenge Science

EDITOR PICK'S

What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

No Tunnels, No Supports: China Stuns the World with a Bridge that Floats like Silk on the River

12 Most Dangerous Poisonous Mushrooms in the World

The migration of 6 million antelopes in Africa

How is the U.S. President Protected While Traveling?

23 Mysterious Natural Phenomena That Challenge Science

How is a double rainbow created, and why is it rare?

Newsletter

THE MOST IMPORTANT WORLD NEWS AND EVENTS OF THE DAY

Subscribe to our mailing list to receives daily updates direct to your inbox!

Category

  • 1001 Mysteries
  • AI – Artificial Intelligence
  • Aliens & UFOs
  • Animal World
  • Antibiotic Resistance
  • Archaeology
  • Bacteria & Insects
  • Biology
  • Biotechnology
  • Climate & Weather

Site Link

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

At Scimyst, we uncover the wonders of science, history, and culture. From ancient mysteries to modern innovations, our stories inspire curiosity and connect you to the fascinating world around us. Explore the unknown with us!

  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 Scimyst - Your gateway to the wonders of science and culture

No Result
View All Result
  • Home
  • Discoveries
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
      • Bacteria & Insects
      • Biotechnology
      • Plants
    • Doomsday
    • Famous Landmarks
    • History
      • This Day in History
    • Military Science
    • Mars Exploration
    • Oceanography
    • Science Q&A
    • Science Quiz
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
      • Cultural Heritage
      • Vietnamese Heritage
  • Technology
    • AI – Artificial Intelligence
    • Computer Science
    • New Technology
      • Self-Driving Cars
    • Scientific Inventions
  • Lifestyle
    • Cancer
    • Environment
      • Climate & Weather
      • Disasters
      • Latest Storm Updates
      • Nature
      • Solutions
    • Medicine & Health
      • Antibiotic Resistance
      • Common Illnesses
      • Dengue Fever
      • Family Medicine Cabinet
      • Food Safety
      • Health
      • Influenza Outbreak
    • Scientific Applications
  • Events
    • Science Events
    • Science Stories
    • Scientific Projects
  • Entertainment
    • Photo Library
    • Videos

© 2025 Scimyst - Your gateway to the wonders of science and culture