CWE-315: Cleartext Storage of Sensitive Information in a Cookie

Variant Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product stores sensitive information in cleartext in a cookie.

扩展描述

Attackers can use widely-available tools to view the cookie and read the sensitive information. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.

常见后果

影响范围: Confidentiality

技术影响: Read Application Data

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2002-1800

Admin password in cleartext in a cookie.

参考: CVE-2001-1537

Default configuration has cleartext usernames/passwords in cookie.

参考: CVE-2001-1536

Usernames/passwords in cleartext in cookies.

参考: CVE-2005-2160

Authentication information stored in cleartext in a cookie.

引入模式

阶段 说明
Architecture and Design OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Plaintext Storage in Cookie -
Software Fault Patterns SFP23 Exposed Data -
关键信息

CWE ID: CWE-315

抽象级别: Variant

结构: Simple

状态: Draft

相关弱点
相关攻击模式
CAPEC-31 CAPEC-37 CAPEC-39 CAPEC-74