Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, and get requests with the sensitive data as query parameters are often used to exfiltrate data. The attackers doesn't even need to set up a special handler, as long as they can read the access logs.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: