←back to thread

482 points galnagli | 1 comments | | HN request time: 0.219s | source
Show context
jacquesm ◴[] No.45674947[source]
That's not just one vulnerability, that's a whole slew of failures. For instance there is absolutely no need to keep those documents on the live server for applicants once they have been used for their intended purpose. Blast radius reduction and all that.

I hope you got at least free tickets for life out of this.

replies(1): >>45675356 #
awesome_dude ◴[] No.45675356[source]
Rule 1.

NEVER trust user supplied data.

Once that rule was broken, any other rules broken became clear to everyone

replies(2): >>45676139 #>>45676989 #
jacquesm ◴[] No.45676139[source]
You'd think that client side security would be something that we'd gotten over by now.
replies(1): >>45677562 #
rpcope1 ◴[] No.45677562[source]
You'd think but I keep meeting even "experienced" technical leadership that have been at this for a while that there's no way to get around validation and security that's implemented in client code.
replies(1): >>45677748 #
cheschire ◴[] No.45677748[source]
I’ve used browser dev tools to regularly add additional drop down options to menus that weren’t present. Huel, for example, only offered 2 or 4 week subscriptions, so I added 3 weeks to it because that’s the frequency I needed, and it worked no problem. 3 weeks later my shakes arrived and every 3 weeks since.
replies(6): >>45677777 #>>45677902 #>>45678651 #>>45678780 #>>45679165 #>>45680139 #
1. jacquesm ◴[] No.45679165[source]
What's insane is that there are countries where this is considered hacking, even if all you do is change the URL.

somefile-small.jpg -> somefile.jpg