[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Information Exposure Through Browser Caching

ID: 525Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: INCOMPLETE
Abstraction Type: Variant





Description

For each web page, the application should have an appropriate caching policy specifying the extent to which the page and its form fields should be cached.

Applicable Platforms
None

Time Of Introduction

  • Implementation

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Confidentiality
 
Read application data
 
Browsers often store information in a client-side cache, which can leave behind sensitive information for other users to find and exploit, such as passwords or credit card numbers. The locations at most risk include public terminals, such as those in libraries and Internet cafes.
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Architecture and Design
 
 Protect information stored in cache.
 
  
Architecture and Design
Implementation
 
 Use a restrictive caching policy for forms and web pages that potentially contain sensitive information.
 
  
Architecture and Design
 
 Do not store unnecessarily sensitive information in the cache.
 
  
Architecture and Design
 
 Consider using encryption in the cache.
 
  

Relationships

Related CWETypeViewChain
CWE-525 ChildOf CWE-895 Category CWE-888  

Demonstrative Examples
None

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
Anonymous Tool Vendor (under NDA)  
 
 
OWASP Top Ten 2004 A2
 
Broken Access Control
 
CWE_More_Specific
 
OWASP Top Ten 2004 A3
 
Broken Authentication and Session Management
 
CWE_More_Specific
 

References:
None

CVE    1
CVE-2021-42015

© SecPod Technologies