Home / Vulnerability Database / Swift : Information leak via GET request
Swift

Swift : Information leak via GET request

Classification

OWASP Mobile Top 10 2014
OWASP Mobile Top 10 2016
PCI DSS 4.0

Overview

The application uses a GET-request instead of a POST-request to transfer data to the server.

Using a GET-request means that the URL and the request parameters may be stored in the browser cache, the server cache, and the cache of intermediate proxy servers. This may lead to the data leak. An attacker can obtain information about the structure of the request and draw conclusions about the architecture of the application, the names of the database tables, and use this information for the attack.

MEDIUM

DerScanner Severity Score

Do you want to fix Swift : Information leak via GET request in your application?

See also

Swift

Swift : Nill password

Swift

Swift : Hardcoded salt

Swift

Swift : Undocumented feature: special account