Project

General

Profile

Actions

Feature #245

open

Feature #235: [Security Audit Round 2 ]

[Security Audit Round 2 ] Insecure Data Storage (Reopened)

Added by Kalyan Battula 12 months ago. Updated 12 months ago.

Status:
Resolved
Priority:
High
Assignee:
Category:
-
Target version:
Start date:
01/05/2024
Due date:
02/05/2024 (about 12 months late)
% Done:

0%

Estimated time:
9:00 h
Deployed In:
Category:

Description

Insecure Data Storage
observation : Repeated
CWE : CWE-312
Description :
Insecure data storage vulnerabilities occur when development teams assume that users
or malware will not have access to a mobile device’s file system and subsequent sensitive
information in data-stores on the device. File systems are easily accessible.
Organizations should expect a malicious user or malware to inspect sensitive data stores.
Usage of poor encryption libraries is to be avoided. Rooting or jailbreaking a mobile
device circumvents any encryption protections. When data is not protected properly,
specialized tools are all that is needed to view application data.
Affected Path(s) :
https://earogya.satragroup.in/frontdesk/dashboard *-Applicable to entire application
Impact :
Insecure data may result in the following business impacts: • Identity theft; • Privacy
violation; • Fraud; • Reputation damage; • External policy violation (PCI); or • Material
loss.
Evidence/Proof Of Concept :
Step 1: Login to the application, access the internal pages and click on logout. It is observed
that even after the user get logged out, the JWT token was still saved in the cookie storage as
shown below.


Files

Actions

Also available in: Atom PDF