Skip to content

Commit 48da586

Browse files
committed
docs: Add Attack Scenario
1 parent dbe2524 commit 48da586

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

2019/en/0xa3-improper-data-filtering.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,15 @@ A3:2019 Improper Data Filtering
1212

1313
### Scenario #1
1414

15+
The User model implements a toJSON() method to serialize a user object as JSON.
16+
While implementing the `GET /v1/articles/{article_id}/comments/{comment_id}`
17+
endpoint that returns details about a specific comment in an article and basic
18+
details about its author, the developer finds the toJSON() method and decides to
19+
use it (without thinking about the sensitive details it may expose). The mobile
20+
team is using the endpoint in the articles view, rendering only relevant data.
21+
An attacker sniffs the mobile app traffic and finds about the sensitive data
22+
exposure.
23+
1524
### Scenario #2
1625

1726
## How To Prevent

0 commit comments

Comments
 (0)