CWE-315: Cleartext Storage of Sensitive Information in a Cookie

Export to Word

Description

The product stores sensitive information in cleartext in a cookie.

Extended Description

Attackers can use widely-available tools to view the cookie and read the sensitive information. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.


ThreatScore

Threat Mapped score: 3.0

Industry: Finiancial

Threat priority: P2 - Serious (High)


Observed Examples (CVEs)

Related Attack Patterns (CAPEC)


Attack TTPs

Malware

APTs (Intrusion Sets)

Modes of Introduction

Phase Note
Architecture and Design OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.

Common Consequences

Potential Mitigations

Applicable Platforms


Demonstrative Examples

Intro: The following code excerpt stores a plaintext user account ID in a browser cookie.

Body: Because the account ID is in plaintext, the user's account information is exposed if their computer is compromised by an attacker.

response.addCookie( new Cookie("userAccountID", acctID) );

Notes

← Back to CWE list