CWE-315 在Cookie中的明文存储
Cleartext Storage of Sensitive Information in a Cookie
结构: Simple
Abstraction: Variant
状态: Draft
被利用可能性: unkown
基本描述
The application stores sensitive information in cleartext in a cookie.
扩展描述
Attackers can use widely-available tools to view the cookie and read the sensitive information. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
相关缺陷
-
cwe_Nature: ChildOf cwe_CWE_ID: 312 cwe_View_ID: 1000 cwe_Ordinal: Primary
-
cwe_Nature: ChildOf cwe_CWE_ID: 312 cwe_View_ID: 699 cwe_Ordinal: Primary
适用平台
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
常见的影响
范围 | 影响 | 注释 |
---|---|---|
Confidentiality | Read Application Data |
示例代码
例
The following code excerpt stores a plaintext user account ID in a browser cookie.
bad Java
Because the account ID is in plaintext, the user's account information is exposed if their computer is compromised by an attacker.
分析过的案例
标识 | 说明 | 链接 |
---|---|---|
CVE-2002-1800 | Admin password in cleartext in a cookie. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1800 |
CVE-2001-1537 | Default configuration has cleartext usernames/passwords in cookie. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1537 |
CVE-2001-1536 | Usernames/passwords in cleartext in cookies. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1536 |
CVE-2005-2160 | Authentication information stored in cleartext in a cookie. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2160 |
Notes
分类映射
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Plaintext Storage in Cookie | ||
Software Fault Patterns | SFP23 | Exposed Data |
相关攻击模式
- CAPEC-31
- CAPEC-37
- CAPEC-39
- CAPEC-74
文章来源于互联网:scap中文网
- 我的微信
- 微信扫一扫
-
- 我的微信公众号
- 微信扫一扫
-
评论