Imagine a javascript command that sends a parameter to PHP. let's imagine that he always send as follows:
var data_id = 'login =' +user_login+ 'password =' + user_pass;
The code is below:
$.ajax({
type: "POST",
url: "functions/a-php/read/read_config.php",
data: data_id,
cache: false,
success: function(data_o){
}
});
I wonder if the User or perhaps a hacker can modify that variable data_id, and instead of sending a parameter login =
, he sends a parameter with the name google=
, he can do it?