We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent dbe2524 commit 48da586Copy full SHA for 48da586
2019/en/0xa3-improper-data-filtering.md
@@ -12,6 +12,15 @@ A3:2019 Improper Data Filtering
12
13
### Scenario #1
14
15
+The User model implements a toJSON() method to serialize a user object as JSON.
16
+While implementing the `GET /v1/articles/{article_id}/comments/{comment_id}`
17
+endpoint that returns details about a specific comment in an article and basic
18
+details about its author, the developer finds the toJSON() method and decides to
19
+use it (without thinking about the sensitive details it may expose). The mobile
20
+team is using the endpoint in the articles view, rendering only relevant data.
21
+An attacker sniffs the mobile app traffic and finds about the sensitive data
22
+exposure.
23
+
24
### Scenario #2
25
26
## How To Prevent
0 commit comments