<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=CRV2_ClientSideCodeJSon</id>
		<title>CRV2 ClientSideCodeJSon - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=CRV2_ClientSideCodeJSon"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_ClientSideCodeJSon&amp;action=history"/>
		<updated>2026-04-11T04:58:45Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_ClientSideCodeJSon&amp;diff=176921&amp;oldid=prev</id>
		<title>Larry Conklin: Created page with &quot;JSON or JavaScript Object Notation is an open standard format that uses easy to read text to transmit data between a server and web applications.  JSON data can be used by a l...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_ClientSideCodeJSon&amp;diff=176921&amp;oldid=prev"/>
				<updated>2014-06-15T19:46:35Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;JSON or JavaScript Object Notation is an open standard format that uses easy to read text to transmit data between a server and web applications.  JSON data can be used by a l...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;JSON or JavaScript Object Notation is an open standard format that uses easy to read text to transmit data between a server and web applications.  JSON data can be used by a large number of programming Languages and is becoming the de-facto standard in replacing XML.&lt;br /&gt;
&lt;br /&gt;
JSON main security concern is JSON text dynamically embedded in JavaScript. This creates vulnerability in the program that may inadvertently to run a malicious script or store the malicious script to a database. This is a very real possibility when dealing with data retrieved from the Internet.&lt;br /&gt;
&lt;br /&gt;
The code reviewer needs to make sure the JSON is not used with Javascript eval. Make sure JSON.parse(…) is used.&lt;br /&gt;
 Var parsed_object = eval(“(“ + Jason_text  + “)”);  // Red flag for the code reviewer.&lt;br /&gt;
 JSON.parse(text[, reviver]); .. // Much better then using javascript eval function.&lt;br /&gt;
&lt;br /&gt;
Code reviewer should check to make sure the developer is not attempting to reject known bad patterns in text/string data, Using regex or other devices is fraught with error and makes testing for correctness very hard. Allow only whitelisted alphanumeric keywords and carefully validated numbers.&lt;br /&gt;
&lt;br /&gt;
Do not allow JSON data to construct dynamic HTML. Always us safe DOM features like innerText or CreateTextNode(…)&lt;/div&gt;</summary>
		<author><name>Larry Conklin</name></author>	</entry>

	</feed>