You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 21, 2022. It is now read-only.
A user retrieves an Authentication Token after a successful login. In some requests this token is leaked in the GET parameter and are vulnerable to disclosure.
The text was updated successfully, but these errors were encountered:
Sensitive information within URLs may be logged in various locations
(including the browser), the web server, and any forward or reverse proxy
servers between the two endpoints. URLs may also be displayed on-screen,
bookmarked or emailed around by users. They may be disclosed to third
parties via the Referer header when any off-site links are followed.
impact:
Authentication tokens allow an attacker unfettered access to the application as the
logged-in user.
Recommendation
When authentication tokens need to be sent using other means than cookies, use an
alternative mechanism, e.g. sending tokens in hidden form fields using the
POST method.
Did you configure your badgr-server to run in "Public" mode instead of "Confidential" mode on your SSO provider's applicaiton configuration system? Or perhaps it should just be upgraded to make more secure options available to you. Ideally with a Authorization Code OAuth grant type the system sends a short-term access "code" in the query parameter that is then exchanged for a longer term token with potential refreshability over a secure connection.
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
A user retrieves an Authentication Token after a successful login. In some requests this token is leaked in the GET parameter and are vulnerable to disclosure.
The text was updated successfully, but these errors were encountered: