User Password Persisted In Memory
User Password Persisted in Memory
Overview of the Vulnerability
The user’s password is kept in memory after the application has ceased utilizing it. An attacker can abuse this to read the user password in memory and login as the user, impersonate them, or make requests on their behalf.
Business Impact
This vulnerability can lead to reputational damage for the business due to a loss in confidence and trust by users.
Steps to Reproduce
Utilize some software that allows computer memory to be accessed in a human-readable format
Log in to the application
Navigate to {{url}} and perform {{action}}
Cease using the application
Using the computer memory viewer, view the password of the user that remained in memory after use
Proof of Concept (PoC)
You can observe the plaintext password that remained in memory after utilization below:
{{screenshot}}
Recommendation(s)
Passwords should be removed from memory once the application has ceased using it to authenticate the user.
Last updated