CAPEC 204 Lifting Sensitive Data Embedded in Cache

Draft Detailed Unknown Risk
Severity Medium

Description

An adversary examines a target application's cache, or a browser cache, for sensitive information. Many applications that communicate with remote entities or which perform intensive calculations utilize caches to improve efficiency. However, if the application computes or receives sensitive information and the cache is not appropriately protected, an attacker can browse the cache and retrieve this information. This can result in the disclosure of sensitive information.

Attack Execution Flow

3

Consequences

Relationships

Related ATT&CK Techniques

1

Resources Required

1