▲ | elric 2 days ago | ||||||||||||||||||||||
Can someone elaborate on how this is a security issue? | |||||||||||||||||||||||
▲ | mrspuratic 2 days ago | parent | next [-] | ||||||||||||||||||||||
Commonly used in access control to check IP addresses, usernames, cookies, query params, URI paths, environment variables ... Also filtering REQUEST_METHOD to allowed verbs is good practice. | |||||||||||||||||||||||
| |||||||||||||||||||||||
▲ | dspillett 2 days ago | parent | prev | next [-] | ||||||||||||||||||||||
Off the top of my head, all that springs to mind is: If someone is using rewrite rules to direct users depending on cookies and other request values, it could permit access to things the current user should not see, or should need to re-auth to see. Though this doesn't seem to be a good way of doing that anyway, certainly not on its own (perhaps as a low resource initial test it is valid, in a bloom filter sort of way it could cover some "definitely shouldn't be here" cases efficiently). | |||||||||||||||||||||||
| |||||||||||||||||||||||
▲ | francislavoie 2 days ago | parent | prev [-] | ||||||||||||||||||||||
Typically a boolean issue like this is a cause for escalation if you use it in combination with some auth handler, like "if has session cookie then serve protected files" and since the condition always passes then it could bypass auth. For example. |