Hmm I can't really indentify any insecurities but was wondering whether you can, if so how to possibly patch/mend?
Heres the code:
header("Location: http://example.com/search/{$_POST['term']}/{$_POST['type']}");
The site which i'm redirecting too does the validation & sanitization on their side, but what I'm concerned about is - is this redirecting insecure in any way (on my side - seeing as I'm using direct $_POST
's).
Appreciate all help.
PS: Just became curious as I've always thought using unsanizited user input is dangerous (or atleast that applies to XSS and SQLi).