Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
hjk10157312yTo be fair the real security has to come from TLS anyway but yeah I'd disqualify that service immediately. Probably stores passwords as pain text too
-
Hazarth94862y@hjk101 TLS is fine , but still TLS doesn't protect you from the client and the web server logging the full request path to logs.
Even if they had encrypted passwords, somewhere their Apache logs probably say
[GET] /login?username=user&password=abc123.
The frontend code may very well log this as well before it makes that request. Or backend code if using the API from a different service. Or hell, even the browser if someone puts this into the browser directly.
Infact, OP should take care to not log this request, otherwise they are storing user names and passwords accidentally in logs in plaintext xD -
hjk10157312y@Hazarth I'm well aware about that unfortunately I've inherited a service that did this once. We disabled access to the CDN logs and wrote a custom log handler to hide the credentials. (During a grace period we needed to support this immediately deprecated mechanism)
Where these kind of services originate there usually isn't any separation of privileges. So if you have access to the logs you have access to intercept headers and post content. Perhaps that views is outdated as just about anything uses some sort of http aware service in the middle. Even the crap generators
I have to add an endpoint to integrate an API and I want to vomit when I think about this major security issue they introduce.
What type of prehistoric dumbass thought GET requests with username and password in the query parameters is a good idea to burden your partner with.
rant