Password type input with auto-complete enabled

Disclosed: 2014-04-19 13:09:30 By ashesh To localize
Unknown
Vulnerability Details
Vulnerability description When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be saved. Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is entered. An attacker with local access could obtain the cleartext password from the browser cache. This vulnerability affects /. Discovered by: MANUAL . Attack details Password type input named sign_in[password] from unnamed form with action http://www.localize.io/ has autocomplete enabled. HTTP headers Request GET / HTTP/1.1 Referer: http://www.localize.io/ Host: www.localize.io Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36 Accept: */* Response HTTP/1.1 200 OK Date: Fri, 18 Apr 2014 04:24:20 GMT Server: Apache Pragma: no-cache Expires: Mon, 24 Mar 2008 00:00:00 GMT Cache-Control: no-cache, no-store X-Frame-Options: sameorigin Set-Cookie: PHPSESSID=fog330ba62qb2gvn292k4n1q83; path=/; HttpOnly Vary: Accept-Encoding Content-Length: 5490 Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Content-Type: text/html; charset=utf-8 Original-Content-Encoding: gzip View HTML response How to fix this vulnerability The password auto-complete should be disabled in sensitive applications. To disable auto-complete, you may use a code similar to: <INPUT TYPE="password" AUTOCOMPLETE="off">
Actions
View on HackerOne
Report Stats
  • Report ID: 7954
  • State: Closed
  • Substate: informative
  • Upvotes: 2
Share this report