The product stores sensitive information in cleartext in a cookie.
Attackers can use widely-available tools to view the cookie and read the sensitive information. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
Threat Mapped score: 3.0
Industry: Finiancial
Threat priority: P2 - Serious (High)
CVE: CVE-2002-1800
Admin password in cleartext in a cookie.
CVE: CVE-2001-1537
Default configuration has cleartext usernames/passwords in cookie.
CVE: CVE-2001-1536
Usernames/passwords in cleartext in cookies.
CVE: CVE-2005-2160
Authentication information stored in cleartext in a cookie.
Phase | Note |
---|---|
Architecture and Design | OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase. |
Intro: The following code excerpt stores a plaintext user account ID in a browser cookie.
Body: Because the account ID is in plaintext, the user's account information is exposed if their computer is compromised by an attacker.
response.addCookie( new Cookie("userAccountID", acctID) );