debian-mirror-gitlab/doc/user/application_security/dast/checks/287.1.md
2022-08-13 15:12:31 +05:30

1.4 KiB

stage group info
Secure Dynamic Analysis To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments

Insecure authentication over HTTP (Basic Authentication)

Description

The target application was found to authenticate users using the Basic Authentication scheme over HTTP. Basic Authentication base64 encodes the username and password and sends it in the Authentication header. Attackers who are in between the communication path (or on the same local network) of the client and server could use packet sniffers to read and decode the username and password.

Remediation

If possible, switch to a more robust method to authenticate users such as OAuth 2.0, or storing usernames and passwords in a data store protected by the Argon2id algorithm. If Basic Authentication must be used, ensure credentials are only transmitted over secure channels such as HTTPS/TLS.

Details

ID Aggregated CWE Type Risk
287.1 false 287 Passive Medium