(no title)
Stealth- | 12 years ago
Also note that this attack, JSON Hijacking, is different than a CSRF (Cross Site Request Forgery) and has little to do with CSRF tokens.
Stealth- | 12 years ago
Also note that this attack, JSON Hijacking, is different than a CSRF (Cross Site Request Forgery) and has little to do with CSRF tokens.
deathanatos|12 years ago
Actually, it's not security measures so much as implementing ECMAScript 5, which explicitly says that array literals must use the built-in constructor, not any override. See 11.1.4 [1], which reads:
> Let array be the result of creating a new object as if by the expression new Array() where Array is the standard built-in constructor with that name.
Object works similarly, and is in 11.1.5. I'm not certain what earlier standards said here, but I suspect they didn't say anything.
[1]: http://www.ecma-international.org/publications/files/ECMA-ST...
jbri|12 years ago
joev_|12 years ago
with the status "unable to contact the vendor or actively neglected by the vendor" :-/
Edit: I meant "injecting" not inlining. Thanks chc for pointing that out.
chc|12 years ago
Stealth-|12 years ago
sanderjd|12 years ago
0: https://github.com/jsanders/angular_rails_csrf/issues/1
maxtaco|12 years ago
smsm42|12 years ago