Analysis:
During the analysis, it was observed that the application didn’t implement cache control directives properly in its response headers because of which the browser was storing sensitive internal pages in its cache. Please refer to the below-provided evidence and proof of concept:
Impact:
This vulnerability can be exploited by an attacker having access to the victim's computer by browsing the cached pages. After getting access to sensitive information, the attacker can misuse the information.
Recommendation:
It is recommended to implement all Cache-Control directives properly. The following solutions are recommended to fix the vulnerability:
I. Multiple mechanisms, including HTTP headers and Meta tags, should be used to ensure that the pages containing sensitive information are not cached by user's browsers.
II. Authenticated pages should be marked with all the variants of the no-cache tag to prevent someone from using the browser's back button to access the history. Some of the tags are:
· Cache-control: private
· Cache-control: no-cache
· Cache-control: no-store
· Cache-control: pre-check=0
· Cache-control: post-check=0
· Cache-control: must-revalidate
· Pragma: no-cache
Comments
Post a Comment