- JSON
infobox file format
mime = application/json
extension = .json
genre = Data interchange
standard = RFC 4627JSON (pronEng|ˈdʒeɪsɒn, i.e., "Jason"), short for JavaScript Object Notation, is a lightweight
computer data interchange format. It is a text-based, human-readable format for representing simpledata structure s andassociative array s (called objects).The JSON format is specified in RFC 4627 by
Douglas Crockford . The officialInternet media type for JSON isapplication/json
. The JSON file extension is.json
.The JSON format is often used for transmitting structured data over a network connection in a process called
serialization .Its main application is in Ajax web application programming, where it serves as an alternative to the use of theXML format.Although JSON was based on a subset of the
JavaScript programming language(specifically, Standard ECMA-262 3rd Edition—December 1999 [cite web
url = http://json.org | title = Introducing JSON | publisher = json.org ] ) and is commonly used with that language, it is considered to be a language-independent data format. Code for parsing and generating JSON data is readily available for a large variety ofprogramming languages . The [http://json.org/ json.org] website provides a comprehensive listing of existing JSON bindings, organized by language.In December 2005, Yahoo! began offering some of its
web service s optionally in JSON.cite web|url=http://developer.yahoo.net/common/json.html|title=Using JSON with Yahoo! Web services|author=Yahoo!] Google started offering JSON feeds for itsGData web protocol in December 2006.cite web|url=http://code.google.com/apis/gdata/json.html|title=Using JSON with Google Data APIs|author=Google]Data types, syntax and example
JSON's basic types are:
* Number (integer, real, or
floating point )
* String (double-quotedUnicode with backslash escaping)
* Boolean (true
andfalse
)
*Array (an ordered sequence of values, comma-separated and enclosed insquare bracket s)
* Object (collection of key:value pairs, comma-separated and enclosed incurly brace s)
*null
The following example shows the JSON representation of an object that describes a person. The object has string fields for first name and last name, contains an object representing the person's address, and contains a list of phone numbers (an array).
Suppose the above text is contained in the JavaScript string variable
contact
. Since JSON is a subset of JavaScript'sobject literal notation, one can then recreate the object describing John Smith with a simpleeval()
:and the fields
p.firstName
,p.address.city
,p.phoneNumbers [0]
etc. are then accessible. Thecontact
variable must be wrapped in parenthesis to avoid an ambiguity in JavaScript's syntax. [cite web|url=http://www.json.org/js.html |title=JSON in JavaScript |publisher=Json.org |date= |accessdate=2008-09-08]In general,
eval()
should only be used to parse JSON if the source of the JSON-formatted text is completely trusted; the execution of untrusted code is obviously dangerous. JSON parsers are available to process JSON input from less trusted sources.JSON Schema
There are several ways to verify the structure and data types inside a JSON object, much like an XML schema. JSON Schema is a specification for a JSON-based format for defining the structure of JSON data. JSON Schema provides a contract for what JSON data is required for a given application and how it can be modified, much like what XML Schema provides for XML. JSON Schema is intended to provide validation, documentation, and interaction control of JSON data. JSON Schema is based on the concepts from XML Schema, RelaxNG, and Kwalify, but is intended to be JSON-based, so that JSON data in the form of a schema can be used to validate JSON data, the same serialization/deserialization tools can be used for the schema and data, and it can be self descriptive. cite web|url=http://www.json.com/json-schema-proposal/|title=JSON Schema Proposal |author=Json.Com
Using JSON in Ajax
The following Javascript code shows how the client can use an
XMLHttpRequest to request an object in JSON format from the server. (The server-side programming is omitted; it has to be set up to respond to requests aturl
with a JSON-formatted string.)Note that the use of
XMLHttpRequest in this example is notcross-browser compatible; syntactic variations are available forInternet Explorer , Opera, Safari, andMozilla -based browsers. The usefulness of XMLHttpRequest is limited by thesame origin policy : the URL replying to the request must reside within the same DNS domain as the server that hosts the page containing the request. Alternatively, theJSONP approach incorporates the use of an encoded callback function passed between the client and server to allow the client to load JSON-encoded data from third-party domains and to notify the caller function upon completion, although this imposes some security risks and additional requirements upon the server.Browsers can also use
<
elements to asynchronously request JSON data in aiframe >cross-browser fashion, or use simple<form action="url_to_cgi_script" target="name_of_hidden_iframe">
submissions. These approaches were prevalent prior to the advent of widespread support for XMLHttpRequest.Dynamic
<script>
tags can also be used to transport JSON data. With this technique it is possible to get around the overly restrictivesame origin policy but it is insecure. [http://json.org/JSONRequest.html JSONRequest] has been proposed as a safer alternative.JSON and PHP
As of version 5.2, PHP provides the "json_encode" function to encode JSON strings. The following code shows how to return a JSON format from the server:
It is also possible to easily convert AJAX PHP scripts that return HTML to return JSON format response using PHP's "ob_XXX" functions like so:
ecurity issues
Although JSON is intended as a data serialization format, its design as a subset of the JavaScript programming language poses several security concerns. These concerns center on the use of a JavaScript interpreter to dynamically execute JSON text as JavaScript, thus exposing a program to errant or malicious script contained therein -- often a chief concern when dealing with data retrieved from the internet. While not the only way to process JSON, it is an easy and popular technique, stemming from JSON's design to be compatible with JavaScript's eval() function, and illustrated by the preceding code examples.
JavaScript
eval()
Because most JSON-formatted text is also syntactically legal JavaScript code, an easy way for a JavaScript program to parse JSON-formatted data is to use the built-in JavaScript
eval()
function, which was designed to evaluate JavaScript expressions. Rather than using a JSON-specific parser, the JavaScript interpreter itself is used to "execute" the JSON data to produce native JavaScript objects.The eval technique is subject to security vulnerabilities if the data and the entire JavaScript environment is not within the control of a single trusted source. If the data is itself not trusted, for example, it may be subject to malicious JavaScript
code injection attacks; unless some additional means is used to validate the data first.Regular expression s are sometimes used to perform this check prior to invokingeval
. Also, such breaches of trust may create vulnerabilities fordata theft , authentication forgery, and other potential misuse of data and resources. TheRFC that defines JSON [http://www.ietf.org/rfc/rfc4627.txt?number=4627] suggests using the following code to validate JSON before eval'ing it (the variable 'text' is the input JSON):A new function,
parseJSON()
, has been proposed as a safer alternative toeval
, as it is specifically intended to process JSON data and not JavaScript. It will likely be included in the Fourth Edition of theECMAScript standard as written in the article cite web | url=http://www.json.org/fatfree.html | title=JSON: The Fat-Free Alternative to XML, though it is available now as a JavaScript library at http://www.JSON.org/json2.jsCross-site request forgery
Naïve deployments of JSON are subject to
cross-site request forgery attacks (CSRF or XSRF). [ [http://jeremiahgrossman.blogspot.com/2006/01/advanced-web-attack-techniques-using.html Advanced Web Attack Techniques using GMail] – Jeremiah Grossman, WhiteHat Security] Because the HTML<script>
tag does not respect thesame origin policy in web browser implementations, a malicious page can request and obtain JSON data belonging to another site. This will allow the JSON-encoded data to be evaluated in the context of the malicious page, possibly divulging passwords or other sensitive data if the user is currently logged into the other site.This is only a problem if the server depends on the browser's Same Origin Policy to block the delivery of the data in the case of an improper request. There is no problem if the server determines the propriety of the request itself, only putting the data on the wire if the request is proper. Cookies are not by themselves adequate for determining if a request was authorized. Exclusive use of cookies is subject to
cross-site request forgery .Comparison with other formats
XML
XML is often used to describe structured data and to serialize objects. Various XML-based protocols exist to represent the same kind of data structures as JSON for the same kind of data interchange purposes. But because they use XML, which is a general purposemarkup language , they are arguably more complex than JSON, which represents data structures in simple text in a form specifically designed for data interchange. Both lack a rich (i.e., explicit) mechanism for representing large binarydata type s such as image data (although binary data can be "stringified" for both by converting to abase64 or similar representation).YAML
Both functionally and syntactically, JSON is effectively a subset of
YAML . Notably, the most widespread YAML library also parses JSON. [ [http://redhanded.hobix.com/inspect/yamlIsJson.html YAML is JSON] , RedHanded, 08 Apr 2005.] Strictly speaking, the syntax is not quite a perfect subset, primarily because YAML lacks native handling of some extended character sets allowed in JSON (e.g. unicode like UTF-32) and requires comma separators to be followed by a space. The most distinguishing point of comparison is that YAML offers the following syntax enrichments which have no corresponding expression in JSON:;Relational: ::YAML offers syntax for relational data: rather than repeating identical data later in a document, a YAML document can refer to an anchor earlier in the file/stream. Recursive structures (for example, an array containing itself) can be expressed this way. [For example, a film data base might list actors (and their attributes) under a Movie's cast, and also list Movies (and their attributes) under an Actor's portfolio.] ;Extensible: ::YAML also offers extensible data types beyond primitives (i.e beyond strings, floats, ints, bools) which can include class-type declarations or Unicode types.;Blocks: ::YAML uses a block-indent syntax to allow formatting of structured data without use of additional characters (ie: braces, brackets, quotation marks, etc.). [Besides giving YAML a different appearance than JSON, This block-indent device permits the encapuslation of text from other markup languages or even JSON in the other languages native literal style and without escaping of collidingsigil s.]JSONP
JSONP or "JSON with padding" is a JSON extension wherein the name of a callback function is specified as an input argument of the call itself. The original proposition appears to have been made in the MacPython blog in 2005 [cite web|url=http://bob.pythonmac.org/archives/2005/12/05/remote-json-jsonp/ |title=from __future__ import * » Remote JSON - JSONP |publisher=Bob.pythonmac.org |date= |accessdate=2008-09-08] and is now used by many
Web 2.0 applications such asDojo Toolkit Applications or Google Toolkit Applications [http://www.gwtapps.com/?p=42] . Further extensions of this protocol have been proposed by considering additional input arguments as, for example, is the case of JSONPP [http://sites.google.com/a/s3db.org/s3db/documentation/mis/json-jsonp-jsonpp] supported byS3DB web services.Because JSONP makes use of script tags, calls are essentially open to the world. For that reason, JSONP may be inappropriate to carry sensitive data.cite web|url=http://www.riaspot.com/blogs/entry/JSONP-for-Cross-Site-XHR|title=JSON P for Cross Site XHR |author=RIAspot]
See also
*
JSON-RPC
*JsonML
*S-expression sReferences
External links
* [http://www.json.org Format home page]
* RFC 4627, current formal JSON specification.
* [http://redhanded.hobix.com/inspect/yamlIsJson.html Relationship between JSON and YAML]
* [http://blogs.sun.com/bblfish/entry/the_limitations_of_json The Limitations of JSON]
* [http://www.hunlock.com/blogs/Mastering_JSON_(_JavaScript_Object_Notation_) Mastering JSON]
* [http://msdn.microsoft.com/en-us/library/bb299886.aspx JSON-Introduction By Microsoft]
Wikimedia Foundation. 2010.