CWE-525 通过浏览器缓存导致的信息暴露
Information Exposure Through Browser Caching
结构: Simple
Abstraction: Variant
状态: Incomplete
被利用可能性: unkown
基本描述
For each web page, the application should have an appropriate caching policy specifying the extent to which the page and its form fields should be cached.
相关缺陷
-
cwe_Nature: ChildOf cwe_CWE_ID: 524 cwe_View_ID: 1000 cwe_Ordinal: Primary
-
cwe_Nature: ChildOf cwe_CWE_ID: 524 cwe_View_ID: 699 cwe_Ordinal: Primary
常见的影响
范围 | 影响 | 注释 |
---|---|---|
Confidentiality | Read Application Data | Browsers often store information in a client-side cache, which can leave behind sensitive information for other users to find and exploit, such as passwords or credit card numbers. The locations at most risk include public terminals, such as those in libraries and Internet cafes. |
可能的缓解方案
Architecture and Design
策略:
Protect information stored in cache.
['Architecture and Design', 'Implementation']
策略:
Use a restrictive caching policy for forms and web pages that potentially contain sensitive information.
Architecture and Design
策略:
Do not store unnecessarily sensitive information in the cache.
Architecture and Design
策略:
Consider using encryption in the cache.
分类映射
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
OWASP Top Ten 2004 | A2 | CWE More Specific | Broken Access Control |
OWASP Top Ten 2004 | A3 | CWE More Specific | Broken Authentication and Session Management |
相关攻击模式
- CAPEC-37
文章来源于互联网:scap中文网
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论