USGS-WiM / SiGLDMS

Data management system for SiGL
Other
0 stars 5 forks source link

Remediate Vulnerability: Password field submitted using GET method #253

Closed aaronstephenson closed 2 years ago

aaronstephenson commented 2 years ago

Acunetix scan reports this app uses GET to submit passwords. Passwords must be submitted using a POST request. This is a Medium vulnerability and is a priority.

esmyers commented 2 years ago

I definitely changed this last year and it is using a POST. Do you think it's the response methods that are causing the issue?
image

esmyers commented 2 years ago

Do we have a specific URL that was identified by the Acunetix scan?

There is an old test version of the DMS running in that bucket that uses the GET method. I deleted that application, but I'm trying to determine if there is still an issue with the current updated version of sigl.wim.usgs.gov/SiGLDMS/

aaronstephenson commented 2 years ago

It says it's hitting https://sigl.wim.usgs.gov/SiGLDMS/component/logInOut/login.html

Here's the specific section of the scan report:

image

aaronstephenson commented 2 years ago

You're probably right about the headers. This line is interesting:

The form's method attribute is either set to GET, or not defined at all, in which case it defaults to GET

So yeah, maybe it's the values in the Access-Control-Allow-Methods header?

esmyers commented 2 years ago

This should take care of it https://github.com/USGS-WiM/SiGLDMS/pull/254

I have no way of testing that this is an acceptable fix for them, but based on the outline of the problem, this seems to have fixed the issue to the best of my knowledge.

aaronstephenson commented 2 years ago

Thanks @esmyers, I'm sure this will fix it. We'll know for sure during the next scan in December!