Commit 1a991217 authored by Philip Cunningham's avatar Philip Cunningham

Add 598.3 documentation for browser based DAST

- Adds 598.3 check documentation
- Updates 598.2 to reflect aggregation status
- Updates index page to link to 598.3
parent 48a294b2
...@@ -22,7 +22,7 @@ reset their passwords, always use POST requests to transmit sensitive data. ...@@ -22,7 +22,7 @@ reset their passwords, always use POST requests to transmit sensitive data.
| ID | Aggregated | CWE | Type | Risk | | ID | Aggregated | CWE | Type | Risk |
|:---|:--------|:--------|:--------|:--------| |:---|:--------|:--------|:--------|:--------|
| 598.2 | false | 598 | Passive | Medium | | 598.2 | true | 598 | Passive | Medium |
## Links ## Links
......
---
stage: Secure
group: Dynamic Analysis
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
---
# Use of GET request method with sensitive query strings (Authorization header details)
## Description
The authorization header value was identified in the request URL. These headers typically contain
usernames and passwords or JWT tokens. These values should never be sent in GET requests as they
maybe captured by proxy systems, stored in browser history, or stored in log files. If an attacker
were to get access to these logs or logging systems, they would be able to gain access to the
target account.
## Remediation
Authorization header details should never be sent in GET requests. When transmitting sensitive information
such as JWT tokens, always use POST requests or headers to transmit the sensitive data.
## Details
| ID | Aggregated | CWE | Type | Risk |
|:---|:--------|:--------|:--------|:--------|
| 598.3 | true | 598 | Passive | Medium |
## Links
- [OWASP](https://owasp.org/www-community/vulnerabilities/Information_exposure_through_query_strings_in_url)
- [CWE](https://cwe.mitre.org/data/definitions/598.html)
...@@ -21,5 +21,6 @@ The [DAST browser-based crawler](../browser_based.md) provides a number of vulne ...@@ -21,5 +21,6 @@ The [DAST browser-based crawler](../browser_based.md) provides a number of vulne
| [548.1](548.1.md) | Exposure of information through directory listing | Low | Passive | | [548.1](548.1.md) | Exposure of information through directory listing | Low | Passive |
| [598.1](598.1.md) | Use of GET request method with sensitive query strings (session ID) | Medium | Passive | | [598.1](598.1.md) | Use of GET request method with sensitive query strings (session ID) | Medium | Passive |
| [598.2](598.2.md) | Use of GET request method with sensitive query strings (password) | Medium | Passive | | [598.2](598.2.md) | Use of GET request method with sensitive query strings (password) | Medium | Passive |
| [598.3](598.3.md) | Use of GET request method with sensitive query strings (Authorization header details) | Medium | Passive |
| [614.1](614.1.md) | Sensitive cookie without Secure attribute | Low | Passive | | [614.1](614.1.md) | Sensitive cookie without Secure attribute | Low | Passive |
| [693.1](693.1.md) | Missing X-Content-Type-Options: nosniff | Low | Passive | | [693.1](693.1.md) | Missing X-Content-Type-Options: nosniff | Low | Passive |
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment