|  | Posted by Jochem Maas on 03/03/05 20:36 
Richard Lynch wrote:> Jochem Maas wrote:
 >
 >>Gareth Williams wrote:
 >>
 >>>Wouldn't using GET instead of POST help?
 >>
 >>in a way it could - but you don't usually want to use a GET as this
 >>can be easily spoofed (i.e. anyone could send you a link or post one in a
 >>forum
 >>that would do the post action without warning you)
 >>
 >>which comes down to: you should be 'certified' if you use GET to allow
 >>users to submit a payment confirmation - you only want a FORM to be able
 >>to
 >>submit such a confirmation rather than allowing any old link to issue such
 >>a
 >>confirmation....
 >>
 >>for a much better description on why using GET is 'bad' in this kind of
 >>situation
 >>I refer you to posts made by Richard Lynch (I think??) in the last 6 weeks
 >>(can't remember the
 >>subject Im afraid)
 >
 >
 > Gah!
 >
 > I'm actually the one who said you should *NOT* fool yourself that POST is
 > any "more secure" than GET.
 
 oops!
 
 >
 > Only the dumbest of the dumb can't figure out how to save an HTML form and
 > modify it to POST whatever they want to your script.
 >
 > Choosing POST over GET should be a matter of aesthetics, not security.
 
 the point I was trying to make is that if you use POST then you know that the
 user had to submit a form. the reason to use POST therefore is simply that
 a _third_party_ cannot trick one of your users into clicking a link
 that actually changes a
 
 >
 > I have many scripts that will behave "the same" with GET or POST input.
 >
 > Or, more correctly, would do the same thing if you were trying to spoof
 > them with GET/POST input.
 >
 > The most common example is to view/edit a record in the database, I often
 > use a link with GET to get to the edit page, and that has a FORM (POST) to
 > the same page to update the record.
 >
 > I'll use REQUEST all over, and if somebody manages to break in and wants
 > to use GET instead of POST to hack it, I don't see a hell of a lot of
 > difference.
 >
 > If they're smart enough to get past the authentication, they're sure as
 > hell smart enough to do a forged POST.  [shrug]
 
 you are right - actually I code pretty much the way you describe - but
 I was meaning a situation where the user is not the hacker but that the hacker
 is a third party trying to trick the user into performing an action....
 which is a lot easier to do with out alerting the user if the relevant action
 can be triggered by a GET.
 
 imagine a link:
 
 <a href="http://www.example.com?a=10&pay=MrX">so payment</a>
 <a href="http://www.example.com?a=10000&pay=MrHacker">read more</a>
 
 then image that as a FORM.
 my point is that the link is alot easier to drop into someone (elses) site than
 a form.
 
 but yes you are right when it comes down to it. thanks for the catch.
 
 remind me again why we acknowledge the difference between POST and GET in 2005?
 
 >
 > GET is only "easier" to spoof that POST if you're comparing really really
 > really stupid people with really really stupid people...
 
 so you have met parents
 
 >
  Navigation: [Reply to this message] |