Hacker News new | past | comments | ask | show | jobs | submit login

You're right about the search example. That doubles the list of demonstrated vulnerabilities in this article from 1 to 2.

I certainly agree that using GET for changing server state would be wrong. I don't know if any of the examples in the article work that way, since all we're provided with is a screenshot with an alert box. That's demonstrated sloppiness on Apple's web site, but not enough information to demonstrate vulnerability.

(I'm definitely voting up your reply for intelligent discussion.)




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: