Cleartext Transmission Of Sensitive Data
Cleartext Transmission of Sensitive Data
Overview of the Vulnerability
When sensitive data is transmitted in cleartext over an unencrypted channel, it can be intercepted via a Person-in-the-Middle (PitM) attack. An attacker can send requests to the server pretending to be the legitimate user by using a PitM attack to access the sensitive data.
Business Impact
This vulnerability can lead to reputational damage and indirect financial loss to the company as customers may view the application as insecure. It can also lead to data theft via an attacker’s ability to manipulate data through their ability to make requests to the server using a legitimate session token.
Steps to Reproduce
Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
Use a browser to navigate to: {{URL}}
Observe data in transit does not enforce TLS for all pages
Monitor the network traffic and intercept user session cookies
Replay the cookie and hijack the authenticated session
Modify user's personal identifiable information (PII)
Proof of Concept (PoC)
The screenshots below show sensitive data being transmitted via cleartext:
{{screenshot}}
Recommendation(s)
All sensitive data should be encrypted while it is being transmitted to and from the application.
Last updated