Yeah, it's a pretty primitive DOS attack. But it's not a security issue.
Request->all() DOS attack ?
me and my friend thought if we are a hacker ,we can do something like $postLink = "http://www.xyz.com?"; ($i < 0 ; $i < 10000000000000 ; $i++){ $postLink += "abc" + i; }
curl('post' , $postlink);
by doing that I can slow down the server is that correct? because it needs to read every single input that I pass in, can't see a reason why we should use request->all() in any case
Same thing would happen whether or not you used $request->all(). It still has to bootstrap laravel and process everything, for each request. This is a very basic DoS attack. If you had 5,000 machines all running it then it would be more of a DDoS attack because at that point it could overwhelm the server, but a single machine? Probably wouldn't notice much if anything. And you'd never notice it even with 10,000 boxes doing it if your site was using cloudfare or similar. They'd detect it and just blackhole the requests so they don't even touch the server.
Please or to participate in this conversation.