Closed GoogleCodeExporter closed 8 years ago
In a vast majority of casts, PUT allows content to be published on the site,
and is exposed unintentionally.
There might be a small set of sites where it is accepted and converted to GET
without any security side effects, or exposed intentionally as a part of an
API; in these cases, it's OK to ignore the bug.
Original comment by lcam...@gmail.com
on 20 Jul 2010 at 7:11
Will the high risk (red) apply to POST method too?
What if PUT/POST etc can only be accepted for the authenticated sessions? Will
that generate high risk issue if assuming we can use skipfish to scan with user
id?
Thanks.
Original comment by jli...@gmail.com
on 20 Jul 2010 at 8:07
POST usually does not have any inherent security consequences, and is not
listed as a potential problem in the report.
See:
http://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_(OWASP-CM-008)#S
hort_Description_of_the_Issue
Original comment by lcam...@gmail.com
on 20 Jul 2010 at 8:34
Thanks a lot.
Original comment by jli...@gmail.com
on 20 Jul 2010 at 11:05
Original issue reported on code.google.com by
jli...@gmail.com
on 20 Jul 2010 at 7:00