Information Leak Through Browser Caching |
Weakness ID: 525 (Weakness Variant) | Status: Incomplete |
Description Summary
For each web page, the application should have an appropriate caching policy specifying the extent to which the page and its form fields should be cached.
Scope | Effect |
---|---|
Confidentiality | Browsers often store information in a client-side cache, which can leave behind sensitive information for other users to find and exploit, such as passwords or credit card numbers. The locations at most risk include public terminals, such as those in libraries and Internet cafes. |
Protect information stored in cache. |
Phases: Architecture and Design; Implementation Use a restrictive caching policy for forms and web pages that potentially contain sensitive information. |
Do not store unnecessarily sensitive information in the cache. |
Consider using encryption in the cache. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 524 | Information Leak Through Caching | Development Concepts (primary)699 Research Concepts (primary)1000 |
ChildOf | ![]() | 723 | OWASP Top Ten 2004 Category A2 - Broken Access Control | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ChildOf | ![]() | 724 | OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management | Weaknesses in OWASP Top Ten (2004)711 |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
Anonymous Tool Vendor (under NDA) | |||
OWASP Top Ten 2004 | A2 | CWE More Specific | Broken Access Control |
OWASP Top Ten 2004 | A3 | CWE More Specific | Broken Authentication and Session Management |
CAPEC-ID | Attack Pattern Name | (CAPEC Version: 1.4) |
---|---|---|
37 | Lifting Data Embedded in Client Distributions |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
Anonymous Tool Vendor (under NDA) | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Potential Mitigations, Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Other Notes, Taxonomy Mappings | ||||
2009-10-29 | CWE Content Team | MITRE | Internal | |
updated Common Consequences, Other Notes, Potential Mitigations |