Read Time:35 Second
Description
The application stores sensitive information in cleartext in a cookie.
Attackers can use widely-available tools to view the cookie and read the sensitive information. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Confidentiality: Read Application Data
Potential Mitigations
CVE References
- CVE-2002-1800
- Admin password in cleartext in a cookie.
- CVE-2001-1537
- Default configuration has cleartext usernames/passwords in cookie.
- CVE-2001-1536
- Usernames/passwords in cleartext in cookies.
- CVE-2005-2160
- Authentication information stored in cleartext in a cookie.