Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Even if the payload is inaccessible, consider the implications of leaking an URL like:

medical-intranet.example.com/uploads/secure_link/adc83b19e793491b1c6ea0fd8b46cd9f32e592fc/john_doe_1987-04-23_chlamydia_1.jpg



And what prevents a distributed denial of service attack or fuzzing using Microsoft's infrastructure? If you were to trick many users into visiting a site with 1000 variants of:

  <img src="https://siteunderattack.com/api/computationally-expensive-function/?image=cute_bunnies_####.jpg"/>
or

  <img src="https://siteunderattack.com/api/function123/?name=Robert'); DROP TABLE students;--&image=cute_bunnies_####.jpg"/>


This is really no different than having the client do the request without the Microsoft proxy.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: