The Wayback Machine - https://web.archive.org/web/20200615035427/https://github.com/securego/gosec/issues/271
Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Flag potential sensitive information leak in Get URLs #271

Open
mkbhanda opened this issue Jan 8, 2019 · 2 comments
Open

Flag potential sensitive information leak in Get URLs #271

mkbhanda opened this issue Jan 8, 2019 · 2 comments
Labels

Comments

@mkbhanda
Copy link

@mkbhanda mkbhanda commented Jan 8, 2019

Summary

Get URLs that have parameters, whether http or https, leak sensitive information when they capture parameters such as API-Keys, usernames, and passwords. Browser extensions, bookmarks, history, and server log files capture these, even when operating in anonymous mode. Browser providers could share the information and log files need to mask the sensitive information. Refer: https://www.fullcontact.com/blog/never-put-secrets-urls-query-parameters/
In non-browser based applications that are controlled by the developer there is more control on client side information leak.

Noticed sites such as Here and Google, for ease of use, suggest putting API keys in the url.
See: https://developer.here.com/documentation/geocoder/topics/quick-start-geocode.html and
https://developers.google.com/maps/documentation/roads/get-api-key

Steps to reproduce the behavior

gosec version

NA

Go version (output of 'go version')

NA

Operating system / Environment

NA

Expected behavior

It would be good to flag such 'sensitive' URL construction, alerting the developer to its potential security implications. And its complement -- alert when urls are logged in the code when they have not explicitly marked as "ignore" or have not tackled some kind of masking.

Actual behavior

NA

@ccojocar
Copy link
Member

@ccojocar ccojocar commented Jan 14, 2019

It's definitely a good idea. Wondering how can we collect a decent set of URL arguments which could potentially be leaked over HTTP?

@ccojocar
Copy link
Member

@ccojocar ccojocar commented Sep 10, 2019

I think this slight overlaps with #2.

@ccojocar ccojocar changed the title New Feature: Flag potential sensitive information leak in Get URLs Flag potential sensitive information leak in Get URLs Sep 10, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
3 participants
You can’t perform that action at this time.