Skip to content

Commit 023a3d6

Browse files
committed
Update to sensitive data in localstorage
1 parent f9aa713 commit 023a3d6

File tree

3 files changed

+15
-30
lines changed

3 files changed

+15
-30
lines changed
Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,18 @@
1-
Local storage, also known as offline, web, or session storage, is the underlying storage mechanism which varies from one user agent to the next. This application discloses a non-sensitive token in the local storage which is accessible by JavaScript. As a result, the token can be captured by an attacker using Cross-Site Scripting (XSS) or Cross-Site Request Forgery (CSRF), allowing them to gather relevant user data and leverage this information to build phishing campaigns.
1+
Local storage, also known as offline, web, or session storage, is the underlying storage mechanism which varies from one user agent to the next. This application discloses a non-sensitive token in the `localStorage`/`sessionStorage` which is accessible by JavaScript. As a result, the token can be captured by an attacker using Cross-Site Scripting (XSS) or Cross-Site Request Forgery (CSRF), allowing them to gather relevant user data and leverage this information to build phishing campaigns.
22

33
**Business Impact**
44

55
This vulnerability can lead to data theft through the attacker’s ability to access and manipulate sensitive data through their access to the application's local session. These malicious actions can result in reputational damage for the business through the impact to customers’ trust.
66

77
**Steps to Reproduce**
88

9-
1. Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
109
1. Use a browser to navigate to: {{URL}}
11-
1. Using the HTTP interception proxy, forward the following request:
12-
13-
```HTTP
14-
{{request}}
15-
```
16-
17-
1. Observe the exposed sensitive token
10+
1. Right click on the page, select Inspect, then select Storage, then Local (or Session) Storage
11+
1. Observe the exposed sensitive token: {{screenshot}}
12+
1. In a new browser window, perform {{action}} to show that the token in `localStorage`/`sessionStorage` can be used to generate a user session: {{screenshot}}
1813

1914
**Proof of Concept (PoC)**
2015

21-
The following screenshot shows the non-sensitive token exposed via the local storage:
16+
The following screenshot shows the non-sensitive token exposed via the `localStorage`/`sessionStorage`:
2217

2318
{{screenshot}}
Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,18 @@
1-
Local storage, also known as offline, web, or session storage, is the underlying storage mechanism which varies from one user agent to the next. This application discloses a sensitive token in the local storage which is accessible by JavaScript. As a result, the sensitive token can be captured by an attacker using Cross-Site Scripting (XSS), allowing them to locally reset a legitimate user’s account password to one they control, successfully taking over the user’s account.
1+
Local storage, also known as offline, web, or session storage, is the underlying storage mechanism which varies from one user agent to the next. This application discloses a sensitive token in the `localStorage`/`sessionStorage` which is accessible by JavaScript. As a result, the sensitive token can be captured by an attacker using Cross-Site Scripting (XSS), allowing them to locally reset a legitimate user’s account password to one they control, successfully taking over the user’s account.
22

33
**Business Impact**
44

55
This vulnerability can lead to data theft through the attacker’s ability to manipulate data through their access to the application, and their ability to interact with other users, including performing other malicious attacks, which would appear to originate from a legitimate user. These malicious actions could also result in reputational damage for the business through the impact to customers’ trust.
66

77
**Steps to Reproduce**
88

9-
1. Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
109
1. Use a browser to navigate to: {{URL}}
11-
1. Using the HTTP interception proxy, forward the following request:
12-
13-
```HTTP
14-
{{request}}
15-
```
16-
17-
1. Observe the exposed sensitive token
10+
1. Right click on the page, select Inspect, then select Storage, then Local (or Session) Storage
11+
1. Observe the exposed sensitive token: {{screenshot}}
12+
1. In a new browser window, perform {{action}} to show that the token in `localStorage`/`sessionStorage` can be used to generate a user session: {{screenshot}}
1813

1914
**Proof of Concept (PoC)**
2015

21-
The following screenshot shows the sensitive token exposed via the local storage:
16+
The following screenshot shows the sensitive token exposed via the `localStorage`/`sessionStorage`:
2217

2318
{{screenshot}}
Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,18 @@
1-
Local storage, also known as offline, web, or session storage, is the underlying storage mechanism which varies from one user agent to the next. This application discloses sensitive data in the local storage which is accessible by JavaScript. As a result, the sensitive data can be captured by an attacker using Cross-Site Scripting (XSS), allowing them to locally access the sensitive data and use it in further attacks.
1+
Local storage, also known as offline, web, or session storage, is the underlying storage mechanism which varies from one user agent to the next. This application discloses sensitive data in the `localStorage`/`sessionStorage` which is accessible by JavaScript. As a result, the sensitive data can be captured by an attacker using Cross-Site Scripting (XSS), allowing them to locally access the sensitive data and use it in further attacks.
22

33
**Business Impact**
44

55
This vulnerability can lead to data theft through the attacker’s ability to access and manipulate sensitive data through their access to the application's local session. These malicious actions can result in reputational damage for the business through the impact to customers’ trust.
66

77
**Steps to Reproduce**
88

9-
1. Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
109
1. Use a browser to navigate to: {{URL}}
11-
1. Using the HTTP interception proxy, forward the following request:
12-
13-
```HTTP
14-
{{request}}
15-
```
16-
17-
1. Observe the exposed sensitive data
10+
1. Right click on the page, select Inspect, then select Storage, then Local (or Session) Storage
11+
1. Observe the exposed sensitive token: {{screenshot}}
12+
1. In a new browser window, perform {{action}} to show that the token in `localStorage`/`sessionStorage` can be used to generate a user session: {{screenshot}}
1813

1914
**Proof of Concept (PoC)**
2015

21-
The following screenshot shows the sensitive data exposed via the local storage:
16+
The following screenshot shows the sensitive data exposed via the `localStorage`/`sessionStorage`:
2217

2318
{{screenshot}}

0 commit comments

Comments
 (0)