Skip to content

Commit

Permalink
Merge pull request #473 from bugcrowd/In-the-Background
Browse files Browse the repository at this point in the history
Update to template for Sensitive Token in URL in background request
  • Loading branch information
RRudder authored May 15, 2024
2 parents e1cf863 + da33b92 commit 7e8693d
Showing 1 changed file with 3 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Overview of the Vulnerability

Sensitive data can be exposed when it is not behind an authorization barrier. When this information is exposed it can place the application at further risk of compromise. The application discloses a sensitive token in the URL in the background which, if captured by an attacker, can be used to escalate privileges or authorize API calls within the application.
Sensitive data can be exposed when it is not behind an authorization barrier. When this information is exposed it can place the application at further risk of compromise. The application discloses a sensitive token in the URL in background requests which are not seen in the main user interface. If captured by an attacker, these sensitive tokens can be used to escalate privileges or authorize API calls within the application.

## Business Impact

Expand All @@ -11,10 +11,10 @@ Disclosure of a sensitive token in the URL in the background could lead to data
## Steps to Reproduce

1. Use a browser to navigate to: {{URL}}
1. Observe the exposed token in the URL
1. Observe the exposed token in the URL of a background request

## Proof of Concept (PoC)

The following screenshot shows the sensitive token in the URL:
The following screenshot shows the sensitive token:

{{screenshot}}

0 comments on commit 7e8693d

Please sign in to comment.