Skip to content

Commit 15cab6e

Browse files
alexrfordaibaars
andauthored
Update ruby/ql/src/queries/security/cwe-598/SensitiveGetQuery.qhelp
Co-authored-by: Arthur Baars <[email protected]>
1 parent 43fec9d commit 15cab6e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

ruby/ql/src/queries/security/cwe-598/SensitiveGetQuery.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
<p>
55
Sensitive information such as user passwords should not be transmitted within the query string of the requested URL.
66
Sensitive information within URLs may be logged in various locations, including the user's browser, the web server,
7-
and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked
7+
and any proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked
88
or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are
99
followed. Placing sensitive information into the URL therefore increases the risk that it will be captured by an attacker.
1010
</p>

0 commit comments

Comments
 (0)