I recall there being a number of "the sky is falling" type things in the
past relating to XSS and JavaScript. One in particular that seemed to get a
lot of press argued that XMLHttpRequest was insecure because it could be
overloaded. Like John said, at the point of allowing your core javascript
functions to be overloaded, avoiding a few particular functions probably
isn't the right solution.

--Erik

On 3/23/07, Luke Lutman <[EMAIL PROTECTED]> wrote:

I got an email today that one of my plugins might be a cross-site
scripting/security risk because the plugin uses the Function.call()
method, like so:

$.fn.plugin = function(elem, options, callback) {
     callback.call(elem, options);
};

Has anyone heard of or dealt with this problem? If it is a security
risk, wouldn't Function.apply also be an issue?

Thanks,
Luke

_______________________________________________
jQuery mailing list
[email protected]
http://jquery.com/discuss/

_______________________________________________
jQuery mailing list
[email protected]
http://jquery.com/discuss/

Reply via email to