Insecure Cache-Control Leading to API key Retrieval
Low
T
ThisData
Submitted None
Actions:
Reported by
pabster
Vulnerability Details
Technical details and impact analysis
Description:
https://thisdata.com/customers/[user]/install/apis/[number]/reauthorize Does not have good browser cache management, allowing another user with access to the device to retrieve the API key. All of the thisdata.com pages do not have the cache management correctly configured, allowing the attacker to gain access to all of the information of the victim, but with the API key it is enough to take full control of the victim's app.
Steps To Reproduce:
1) Go to the API Settings.
2) Logout
3) Click on the back button.
The page will show the API key.
Danger:
In a PC scenario in an office or in a library or in a coffee shop or such places allow for an attacker to exploit this vulnerability (since the amount of pages visited after visiting the API settings doesn't matter). Also it is very easy to get access to a laptop, so this is a likable scenario, and once it happens the attacker has full control over the victim's app data since he/she can use the API key to add users ...
Solution:
Add the header:("Cache-Control: no-store, no-cache, must-revalidate");
You currently don't have the no-store or the no-cache, which is enough to be able to exploit this vulnerability.
Tested in Chrome latest version.
Hope it helps.
Sincerely,
Pablo
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Business Logic Errors