As always, the devil is in the details. There's a security hole that
looks like its going to be difficult to plug. The problem is that
JNEXT can verify that the signature of the JavaScript code is
authentic at a given moment T, but that does not mean that it would
have been authentic at T-1 and since we are dealing with JavaScript it
doesn't mean it will be authentic at T+1.
This means that a malicious hacker can add code to a signed HTML page
without JNEXT noticing that something has gone wrong when the DOM is
inspected as follows.
<html><body>
<script id="id1">
alert( document.getElementById("id1").innerHTML );
var strStealthCode = "Stealth malicous code has just used JNEXT to
format your disk"
setTimeout( "(function() { alert( document.getElementById('id1'));
alert( strStealthCode ) })()", 3000 );
// Remove traces of malicious code
var obj = document.getElementById("id1");
obj.parentNode.removeChild(obj);
// JNEXT script signature authentication starts at this point
</script>
</body></html>
Need to do some more research on what can be done to fix this
-Amnon