CVE-2025-58584
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-06

Last updated on: 2025-10-06

Assigner: SICK AG

Description
In the HTTP request, the username and password are transferred directly in the URL as parameters. However, URLs can be stored in various systems such as server logs, browser histories or proxy servers. As a result, there is a high risk that this sensitive data will be disclosed unintentionally.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-06
Last Modified
2025-10-06
Generated
2026-05-07
AI Q&A
2025-10-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
sick sick_enterprise_analytics *
sick sick_logistic_analytics *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-598 The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs because the username and password are sent directly in the URL as parameters in an HTTP request. Since URLs can be stored in places like server logs, browser histories, or proxy servers, this sensitive information can be unintentionally exposed to unauthorized parties.


How can this vulnerability impact me? :

The vulnerability can lead to unintentional disclosure of sensitive credentials such as usernames and passwords. This exposure increases the risk of unauthorized access to systems or accounts, potentially compromising security.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by monitoring HTTP requests for URLs containing username and password parameters. For example, using network traffic analysis tools or inspecting server logs for URLs with sensitive data in query parameters. Commands like 'grep' on server logs (e.g., grep -i "username=" /var/log/httpd/access_log) or using packet capture tools like 'tcpdump' or 'Wireshark' to filter HTTP requests containing credentials in URLs can help identify this issue.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding sending usernames and passwords in URLs. Instead, use secure methods such as POST requests with encrypted payloads, implement HTTPS to protect data in transit, and configure servers and applications to not log sensitive information in URLs. Additionally, review and clean existing logs to remove any stored sensitive data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart