6. of Information Disclosure
An attacker can read data because it’s hidden or occluded (for undo or change tracking) and the user might forget that it’s there.
Threat |
|
The document format you’re using stores information in the file about changes you’ve made. By examining the file, things that you may have removed because you didn’t want the recipient to see them can be recovered. |
|
CAPEC |
CAPEC-116 - Excavation CAPEC-150 - Collect Data from Common Resource Locations CAPEC-212 - Functionality Misuse |
ASVS |
8.1.2 - Ensure proper housekeeping is being performed and that temporary data is cleaned up properly. 8.2.2 - Ensure that data in the frontend and middleware is also cleaned up properly. 8.3.6 - Ensure that... |