Password field submitted using GET method

Description

During the scan,Cytrix managed to found that password fields were sent using the GET method (in the URL).
It might lead to sensitive user information being disclosed.

An attacker could exploit this vulnerability to steal the victim’s password in Clear Text using MITM (Man In The Middle) or check the browser’s history.

Recommendation

To prevent this vulnerability, make sure that all sensitive information is being sent using the POST sending method.

References

https://cwe.mitre.org/data/definitions/598.html

< Return to all Vulnerabilities

Servers 101

Let’s have a “quick” Servers 101 Course. Courtesy of Cytrix! If you’ve been on the internet for over an hour, you probably already heard of

Read More »

Crossing Scripts – XSS

Injections. SQL Injections. Cross-site Scripting (hence the amazing title “Crossing Scripts – XSS”). There all sorts of Injection-Based attacks, if you want to read about

Read More »