We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 4ba5ae0 commit 3d6a526Copy full SHA for 3d6a526
javascript/ql/src/Security/CWE-598/SensitiveGetQuery.qhelp
@@ -6,7 +6,7 @@ Sensitive information such as user passwords should not be transmitted within th
6
Sensitive information within URLs may be logged in various locations, including the user's browser, the web server,
7
and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked
8
or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are
9
-followed. Placing passwords into the URL therefore increases the risk that they will be captured by an attacker.
+followed. Placing sensitive information into the URL therefore increases the risk that it will be captured by an attacker.
10
</p>
11
</overview>
12
0 commit comments