CVE-2025-58584
BaseFortify
Publication date: 2025-10-06
Last updated on: 2025-10-06
Assigner: SICK AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sick | sick_enterprise_analytics | * |
| sick | sick_logistic_analytics | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-598 | The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that request. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs because the username and password are sent directly in the URL as parameters in an HTTP request. Since URLs can be stored in places like server logs, browser histories, or proxy servers, this sensitive information can be unintentionally exposed to unauthorized parties.
How can this vulnerability impact me? :
The vulnerability can lead to unintentional disclosure of sensitive credentials such as usernames and passwords. This exposure increases the risk of unauthorized access to systems or accounts, potentially compromising security.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by monitoring HTTP requests for URLs containing username and password parameters. For example, using network traffic analysis tools or inspecting server logs for URLs with sensitive data in query parameters. Commands like 'grep' on server logs (e.g., grep -i "username=" /var/log/httpd/access_log) or using packet capture tools like 'tcpdump' or 'Wireshark' to filter HTTP requests containing credentials in URLs can help identify this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding sending usernames and passwords in URLs. Instead, use secure methods such as POST requests with encrypted payloads, implement HTTPS to protect data in transit, and configure servers and applications to not log sensitive information in URLs. Additionally, review and clean existing logs to remove any stored sensitive data.