Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Vulnerable CGI Scripts • Chapter 4 155
script, or a form may have an option button or a check box that offers a
choice that isn’t supported by the script. For this reason, code in your
CGI script should recognize bad information and ignore it.
Don’t use GET to send sensitive data. If the GET method is used, you
won't have to worry about setting limits, as this method is self-limiting.
The GET method will only deliver about a kilobyte of data to a script.
In addition, a Web server can automatically limit the size of data placed
into the QUERY_STRING environment variable, which determines
how the GET method will pass data to a CGI script. However, if the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312