CWE-598 通过GET请求中的查询字符串导致的信息暴露

Information Exposure Through Query Strings in GET Request

结构: Simple

Abstraction: Variant

状态: Draft

被利用可能性: unkown

基本描述

The web application uses the GET method to process requests that contain sensitive information, which can expose that information through the browser's history, Referers, web logs, and other sources.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 200 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 200 cwe_View_ID: 699 cwe_Ordinal: Primary

常见的影响

范围 影响 注释
Confidentiality Read Application Data At a minimum, attackers can garner information from query strings that can be utilized in escalating their method of attack, such as information about the internal workings of the application or database column names. Successful exploitation of query string parameter vulnerabilities could lead to an attacker impersonating a legitimate user, obtaining proprietary data, or simply executing actions not intended by the application developers.

可能的缓解方案

Implementation

策略:

When sensitive information is sent, use of the POST method is recommended (e.g. registration form).

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
Software Fault Patterns SFP23 Exposed Data