First published: Mon Apr 30 2007(Updated: )
The Google Web Toolkit (GWT) framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Web Toolkit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2378 is considered to have a medium severity due to its potential for data leakage.
To address CVE-2007-2378, implement proper data protection mechanisms when exchanging JSON data.
CVE-2007-2378 can facilitate attacks such as data theft through unauthorized JSON data exposure.
All versions of Google Web Toolkit prior to the fix for CVE-2007-2378 are affected.
Exploiting CVE-2007-2378 can lead to unauthorized access to sensitive data transmitted in JSON format.