Project

General

Profile

Actions

Bug #92

closed

Feature #65: Security Audit

[Security Audit ] 27 -Sensitive Data Passed Through URL Parameters

Added by Kalyan Battula about 1 year ago. Updated 7 months ago.

Status:
Closed
Priority:
Low
Category:
-
Target version:
Start date:
17/04/2024
Due date:
% Done:

0%

Estimated time:
Deployed In:
Category:

Description

27- Sensitive Data Passed Through URL Parameters
CWE : CWE-598
Description :
The web application uses the HTTP GET method to process a request and includes
sensitive information in the query string of that request.
Affected Path(s) :
https://his-healthidservice.satragroup.in/abdm/isAvailable/customHealthId/srinuks.1 *-Applicable to entire
application
Impact :
This allows attackers to obtain sensitive data such as usernames, passwords, tokens
(authX), database details, and any other potentially sensitive data. Simply using HTTPS
does not resolve this vulnerability.
Recommendation :
When sensitive information is sent, use the POST method (e.g. registration form, login
form, etc.).
Evidence/Proof Of Concept :
Step 1: ABHA Username Passed Through URL as shown in below screenshot.


Files

clipboard-202404171610-2mfsz.png (40.2 KB) clipboard-202404171610-2mfsz.png Kalyan Battula, 17/04/2024 04:10 PM
Actions #1

Updated by Pavan kumar Siddamsetti about 1 year ago

  • Assignee set to Pavan kumar Siddamsetti
Actions #2

Updated by Pavan kumar Siddamsetti 12 months ago

  • Status changed from New to In Progress
Actions #3

Updated by Vasudev Mamidi 12 months ago

  • Status changed from In Progress to Resolved
Actions #4

Updated by Sivakanth Kesiraju 12 months ago

  • Target version set to Sprint 1 (29th April - 3rd May)
Actions #5

Updated by Sivakanth Kesiraju 12 months ago

  • Target version changed from Sprint 1 (29th April - 3rd May) to Security Audit
Actions #6

Updated by Gautam Kumar 7 months ago

  • Status changed from Resolved to Closed
Actions

Also available in: Atom PDF