--- layout: post status: publish published: true title: Bypassing Same Origin Policy using Mash-Ups wordpress_id: 280 wordpress_url: http://pro.grammatic.org/post-bypassing-same-origin-policy-using-mashups-19.aspx date: !binary |- MjAwNy0wNS0yMSAxNDoyMzo0NCArMDIwMA== date_gmt: !binary |- MjAwNy0wNS0yMSAxNDoyMzo0NCArMDIwMA== categories: - Technology - InfoSec tags: - information security - XSS comments: [] ---

GNUCITIZEN has been going on about this for some time now, but the truly devastating impact of what he has been saying only actually hit me today when reading about his JavaScript interface to Johnny's Google Hacking Database.

The scenario is as follows. The interface contains NO SERVER SIDE SCRIPTS and no iframes or other such methods for loading offsite data but instead utilises the JSON data format to include remote script files. GC's example uses Dapper to perform the remote data retrieval in JSON format and then loads it into a script tag. For example:

{% highlight html %} {% endhighlight %}

This loads the contents of the Google Hacking Database into a JavaScript object which can then be parsed. Essentially this is remote data retrieval entirely from JavaScript. If services like Dapper continue to develop (for example to allow access to an exact URL and return the output in JSON format) then the Same Origin Policy is history.