mirror of
https://github.com/github/codeql.git
synced 2026-04-28 18:25:24 +02:00
Update ruby/ql/src/queries/security/cwe-598/SensitiveGetQuery.qhelp
Co-authored-by: Arthur Baars <aibaars@github.com>
This commit is contained in:
@@ -4,7 +4,7 @@
|
||||
<p>
|
||||
Sensitive information such as user passwords should not be transmitted within the query string of the requested URL.
|
||||
Sensitive information within URLs may be logged in various locations, including the user's browser, the web server,
|
||||
and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked
|
||||
and any proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked
|
||||
or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are
|
||||
followed. Placing sensitive information into the URL therefore increases the risk that it will be captured by an attacker.
|
||||
</p>
|
||||
|
||||
Reference in New Issue
Block a user