1
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
<title>Ajaxterm</title>
5
<meta http-equiv="content-type" content="text/html; charset=UTF-8"/>
6
<link rel="stylesheet" type="text/css" href="ajaxterm.css"/>
7
<script type="text/javascript" src="sarissa.js"></script>
8
<script type="text/javascript" src="sarissa_dhtml.js"></script>
9
<script type="text/javascript" src="ajaxterm.js"></script>
10
<script type="text/javascript">
12
ajaxterm.py creates a random session_id to demultiplex multiple connections,
13
and to add a layer of security - in its shipping form, ajaxterm accepted any session_id
14
and was susceptible to an easy exploit
16
SESSION_ID = '$session_id';
17
window.onload=function() {
18
t=ajaxterm.Terminal("term",80,25);