Trusting HTTP Permission Methods on the Server Side

Incomplete Variant
Structure: Simple
Description

This vulnerability occurs when a server incorrectly assumes that HTTP GET requests are always safe and cannot change server-side data. Attackers can exploit this flawed assumption to bypass security controls and perform unauthorized actions like modifying or deleting resources.

Extended Description

HTTP methods like GET are designed by specification to retrieve information without side effects, leading developers to sometimes rely on them as a security boundary. The problem is that the protocol itself doesn't enforce this; it's entirely up to the application code. Developers can—and often do—program their endpoints to accept GET requests that create, update, or delete data, especially in REST APIs. If access controls are only checked for methods like POST, PUT, or DELETE, attackers can simply use a GET request to perform the same dangerous actions. You must enforce authorization checks based on the user's permissions and the action's intent, not the HTTP method used. Never assume that POST, PUT, or DELETE are the only methods capable of altering state. Your security logic should validate every request, regardless of whether it's a GET or another method, to ensure the user is authorized for the specific operation they are trying to perform.

Common Consequences 3
Scope: Access Control

Impact: Gain Privileges or Assume Identity

An attacker could escalate privileges.

Scope: Integrity

Impact: Modify Application Data

An attacker could modify resources.

Scope: Confidentiality

Impact: Read Application Data

An attacker could obtain sensitive information.

Potential Mitigations 1
Phase: System Configuration
Configure ACLs on the server side to ensure that proper level of access control is defined for each accessible resource representation.
Likelihood of Exploit

High

Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Modes of Introduction
Architecture and Design
Implementation
Operation
Related Weaknesses