Loading HuntDB...

Sensitive Information Disclosure via Back Button Post Logout on https://apps.nextcloud.com/account/

Low
N
Nextcloud
Submitted None

Vulnerability Details

Technical details and impact analysis

## Summary: A cache control vulnerability was identified on the https://apps.nextcloud.com/account/ page. After logging out, sensitive information such as the user's first name, last name, and email address remains accessible by using the browser's back button. This occurs due to improper caching of authenticated pages, allowing unauthorized access to sensitive user information. ## Steps To Reproduce: 1. Navigate to https://apps.nextcloud.com/account/ and log in using valid credentials. 2. Observe that the account dashboard displays sensitive information such as your name, email, and other details. 3. Click on the Logout button. 4. Press the Back button on the browser. 5. Observe that the previous page containing sensitive information is still accessible without re-authentication. ## Supporting Material/References: * OWASP Secure Headers Project: https://owasp.org/www-project-secure-headers/ * MDN Web Docs - Cache-Control Header: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cache-Control ## Impact - Privacy Violation: Sensitive information is exposed to unauthorized access. - Regulatory Non-Compliance: Fails to comply with GDPR or similar data protection regulations. - Security Risk: In shared computer scenarios, another user could retrieve the cached content.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted