This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Testing for WS HTTP GET parameters/REST attacks (OWASP-WS-005)

From OWASP
Revision as of 10:29, 26 October 2006 by EoinKeary (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

HTTP GET parameters. Many XML applications are invoked by passing them parameters using HTTP GET queries Example: The HTTP request with query string /viewDetail=detail-10293, the HTTP GET parameter is detail-10293). These are sometimes known as “REST-style" Web Services. These Web Services can be attacked by passing malicious content on the HTTP GET string (e.g. Extra long parameters (2048 chars), SQL statements/injection or OS Injection parameters).