Home / Vulnerability Database / Kotlin : Plain storage of sensitive information in a cookie
Kotlin
Kotlin : Plain storage of sensitive information in a cookie
Classification
OWASP Top 10 2017
CWE
Overview
The application stores sensitive information in cleartext in a cookie.
Attackers can use widely-available tools to view the cookie and read the sensitive information. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
Sensitive Data Exposure vulnerabilities take the third place in the “OWASP Top 10 2017” web-application vulnerabilities ranking.
MEDIUM
DerScanner Severity Score
Do you want to fix Kotlin : Plain storage of sensitive information in a cookie in your application?
See also
Kotlin
Kotlin : Missing required cryptographic step
Kotlin
Kotlin : Logging into system output
Kotlin
