TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Hacking HTTP Status Codes

8 点作者 tewks超过 14 年前

2 条评论

rst超过 14 年前
Technical details here: <a href="https://grepular.com/Abusing_HTTP_Status_Codes_to_Expose_Private_Information" rel="nofollow">https://grepular.com/Abusing_HTTP_Status_Codes_to_Expose_Pri...</a><p>The trick is to identify GET requests that will succeed only if the victim is logged into $SITE_OF_INTEREST, and bury them in an<p><pre><code> &#60;img src="https://SITE_OF_INTEREST/more/stuff/here" onload="is_logged_in()" onerror="not_logged_in()" ...&#62; </code></pre> If $SITE_OF_INTEREST doesn't have decent CSRF protection, this is an easy way for a rogue website to not only make a request, but observe the result.
johns超过 14 年前
Original lengthy discussion <a href="http://news.ycombinator.com/item?id=2139107" rel="nofollow">http://news.ycombinator.com/item?id=2139107</a>