Beefy Boxes and Bandwidth Generously Provided by pair Networks
Perl: the Markov chain saw

Re^2: CGI application

by dHarry (Abbot)
on Feb 15, 2011 at 08:49 UTC ( #888155=note: print w/ replies, xml ) Need Help??

in reply to Re: CGI application
in thread CGI application

From a security point-of-view POST and GET are more or less the same. While it is true that POST doesn't show information via the URL, it exposes the same information as a GET in the actual network communication. Some would say using usr/pwd over http is completely unsafe. If security is an issue you better use https, sufficient for most purposes.



Comment on Re^2: CGI application
Replies are listed 'Best First'.
Re^3: CGI application
by fidesachates (Monk) on Feb 15, 2011 at 16:16 UTC
    Absolutely true. I hadn't considered man in the middle or arp poisoning type attacks where the intruder will actually see the payload of the packets.

    However, what POST protects against is for instance if a website uses a form to reset a password "". Any bored teenager can get unsuspecting users to click a link with that hyperlink embedded and reset that user's password. Obviously there are more dangerous examples than what that one, but it is this type of "attack" that POST will prevent in that the action is not present in the url.

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://888155]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others imbibing at the Monastery: (8)
As of 2015-10-06 15:27 GMT
Find Nodes?
    Voting Booth?

    Does Humor Belong in Programming?

    Results (153 votes), past polls