- From: Yutaka Hirano <notifications@github.com>
- Date: Tue, 07 May 2019 21:50:24 -0700
- To: whatwg/fetch <fetch@noreply.github.com>
- Cc: Subscribed <subscribed@noreply.github.com>
Received on Wednesday, 8 May 2019 04:50:46 UTC
An attacker can add random query parameters (e.g., fetch(url + '&bogus=' + random_number, {mode: 'no-cors'})) to the target URL, which has a similar effect. I'm not sure how meaningful this protect would be. -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/whatwg/fetch/issues/902#issuecomment-490346174
Received on Wednesday, 8 May 2019 04:50:46 UTC