(no title)
mandrade2 | 5 months ago
If only developers never made use of GET to modify resources...
https://www.reddit.com/r/webdev/comments/6999x7/comment/dh4v...
mandrade2 | 5 months ago
If only developers never made use of GET to modify resources...
https://www.reddit.com/r/webdev/comments/6999x7/comment/dh4v...
userbinator|5 months ago
I thought it'd be this old but memorable article: https://thedailywtf.com/articles/The_Spider_of_Doom
andy99|5 months ago
kookybakker|5 months ago
nnikiforakis|5 months ago
GET requests are also easier to be abused in Cross Site Request Forgery (CSRF) attacks. Modern countermeasures in browsers (like SameSite cookies) will protect cross-origin POST and other state-changing methods, but will largely allow GET requests to go through while carrying session cookies.
ammario|5 months ago
Of course, some websites may permit mutations through GET so it’s probably only sensible to use alongside known hosts.