34 lines
1.4 KiB
Markdown
34 lines
1.4 KiB
Markdown
|
---
|
||
|
stage: Secure
|
||
|
group: Dynamic Analysis
|
||
|
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
|
||
|
---
|
||
|
|
||
|
# Insecure authentication over HTTP (Basic Authentication)
|
||
|
|
||
|
## Description
|
||
|
|
||
|
The target application was found to authenticate users using the Basic Authentication scheme over HTTP.
|
||
|
Basic Authentication base64 encodes the username and password and sends it in the `Authentication` header.
|
||
|
Attackers who are in between the communication path (or on the same local network) of the client and server
|
||
|
could use packet sniffers to read and decode the username and password.
|
||
|
|
||
|
## Remediation
|
||
|
|
||
|
If possible, switch to a more robust method to authenticate users such as OAuth 2.0, or storing usernames
|
||
|
and passwords in a data store protected by the Argon2id algorithm. If Basic Authentication must be used,
|
||
|
ensure credentials are only transmitted over secure channels such as HTTPS/TLS.
|
||
|
|
||
|
## Details
|
||
|
|
||
|
| ID | Aggregated | CWE | Type | Risk |
|
||
|
|:---|:--------|:--------|:--------|:--------|
|
||
|
| 287.1 | false | 287 | Passive | Medium |
|
||
|
|
||
|
## Links
|
||
|
|
||
|
- [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html)
|
||
|
- [OAuth 2.0](https://oauth.net/2/)
|
||
|
- [CWE-287](https://cwe.mitre.org/data/definitions/287.html)
|
||
|
- [RFC](https://datatracker.ietf.org/doc/html/rfc7617)
|