Information Leak Through Caching |
Weakness ID: 524 (Weakness Variant) | Status: Incomplete |
Description Summary
The application uses a cache to maintain a pool of objects, threads, connections, pages, or passwords to minimize the time it takes to access them or the resources to which they connect. If implemented improperly, these caches can allow access to unauthorized information or cause a denial of service vulnerability.
Protect information stored in cache. |
Do not store unnecessarily sensitive information in the cache. |
Consider using encryption in the cache. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 200 | Information Exposure | Development Concepts (primary)699 Research Concepts (primary)1000 |
ParentOf | ![]() | 525 | Information Leak Through Browser Caching | Development Concepts (primary)699 Research Concepts (primary)1000 |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
Anonymous Tool Vendor (under NDA) | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Potential Mitigations, Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Taxonomy Mappings |