我正在研究一个遗留系统,我们刚刚使用 HP Fortify 对其进行了扫描,得到了 JavaScript Hijacking: Vulnerable Framework,代码如下。我能做些什么来确保这一点?我并不完全理解这个问题。
function getMissionOverwriteDocsDataCountComponent(siteNo, fcg, catCode, facNo, assetUid, compNo) {
// Make the Ajax call
$.ajax({
url: 'MissionOverwriteAj.aspx',
data: {
reqType: 'getMissionOverwriteDocsCountComponent',
siteNo: siteNo,
fcg: fcg,
catCode: catCode,
facNo: facNo,
assetUid: assetUid,
compNo: compNo
},
dataType: "text",
cache: false,
async: false,
error: errorFunc,
success: function(response){
//alert(response);
attCount = response;
}
});
}
这在 VB 中调用了一个 ASPX 页面
Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs) Handles Me.Load
Dim reqType As String = Request.Params("reqType")
userID = Session(UserID).ToString()
orgID = Session(OrgID).ToString()
facility = New Facility(Request.Params("siteNo"),
Request.Params("facNo"),
Request.Params("fcg"),
Request.Params("catCode"),
Request.Params("assetUid"))
' Determine what type of call is being made.
Select Case reqType