[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Plaintext Storage in a Cookie

ID: 315Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Variant





Description

Storing sensitive data in plaintext in a cookie makes the data more easily accessible than if encrypted. This significantly lowers the difficulty of exploitation by attackers.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Confidentiality
 
Read application data
 
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
  Sensitive information should not be stored in plaintext in a cookie. Even if heavy fortifications are in place, sensitive data should be encrypted to prevent the risk of losing confidentiality.
 
  

Relationships

Related CWETypeViewChain
CWE-315 ChildOf CWE-895 Category CWE-888  

Demonstrative Examples   (Details)

  1. The following code excerpt stores a plaintext user account ID in a browser cookie. (Demonstrative Example Id DX-44)

Observed Examples

  1. CVE-2002-1800 : Admin password in plaintext in a cookie.
  2. CVE-2001-1537 : Default configuration has cleartext usernames/passwords in cookie.
  3. CVE-2001-1536 : Usernames/passwords in cleartext in cookies.
  4. CVE-2005-2160 : Authentication information stored in cleartext in a cookie.

For more examples, refer to CVE relations in the bottom box.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
PLOVER  Plaintext Storage in Cookie
 
 

References:
None

CVE    1
CVE-2021-34564

© SecPod Technologies