-
Type:
Bug
-
Resolution: Unresolved
-
Priority:
Medium
-
Affects Version/s: 3.4.0
-
AMRIT Sprint 48, AMRIT Sprint 49
-
Platform
-
UAT
The application disables or restricts the right-click (context menu) functionality on https://uatamrit.piramalswasthya.org/ecd/login. While this is often implemented to prevent content copying, it is not an effective security measure and can negatively impact accessibility and user experience. Users can still bypass it using keyboard shortcuts, developer tools, or browser settings.
| Vulnerability Name | Vulnerable Point, Port or Parameter | CVE/CWE | CVSS Score | Overall Risk (Severity) |
Mapping with OWASP Testing Checklist | Observation / Description | Impact | Recommendation | Reference | Steps to reproduce |
| Right Click | https://uatamrit.piramalswasthya.org/ecd/login | CWE-16 | 3.1 | Low | OWASP Client Side Testing | This allows users to easily inspect the page source, view embedded JavaScript, and analyze hidden input fields or client-side logic through browser developer tools. | Right-click and developer tools can expose frontend implementation details | Disable Right-Click on Login Pages | https://cwe.mitre.org/data/definitions/16.html | Step 1 : During The Security Assessment While accessing the login page during the security assessment, we observed that right-click functionality was enabled |