debian-mirror-gitlab/doc/user/application_security/dast/checks/598.3.md
2022-07-23 20:15:48 +02:00

1.2 KiB

stage group info
Secure Dynamic Analysis To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments

Use of GET request method with sensitive query strings (Authorization header details)

Description

The authorization header value was identified in the request URL. These headers typically contain usernames and passwords or JWT tokens. These values should never be sent in GET requests as they maybe captured by proxy systems, stored in browser history, or stored in log files. If an attacker were to get access to these logs or logging systems, they would be able to gain access to the target account.

Remediation

Authorization header details should never be sent in GET requests. When transmitting sensitive information such as JWT tokens, always use POST requests or headers to transmit the sensitive data.

Details

ID Aggregated CWE Type Risk
598.3 true 598 Passive Medium