-
Type:
Task
-
Resolution: Done
-
Priority:
Medium
-
Affects Version/s: None
-
FLW Sprint 37, FLW Sprint 38, FLW Sprint 39
-
FLW Mobile App
-
All
Sensitive data (e.g., tokens, passwords, PII) is stored in the device’s local database without proper encryption.
Impact:
Compromise of sensitive data if device is rooted or accessed physically.
| Vulnerability Name | Vulnerable URL | CVE/CWE | CVSS Score | Overall Risk (Severity) |
Observation / Description | Impact | Recommendation | Reference | Steps to reproduce |
| /data/data/org.piramalswasthya.sakhi.saksham.uat/databases # cat Sakhi-2.0-In-app-database | Sensitve Information Stored In Local Database | CWE-922 | 4.2 | Medium | This vulnerability occurs when an Android application stores user passwords or sensitive information in plain text within its local database. Local databases on Android are often used to store app-related data, and when passwords are stored without proper encryption or hashing, they can be easily accessed and read by anyone with access to the device or the app's database file. This practice is a significant security flaw, as it exposes sensitive user information to potential attackers who may gain access to the device or the app's data. | Hash and Salt Passwords: Implement strong cryptographic hashing algorithms (e.g., bcrypt, scrypt) to securely store passwords in the database. Additionally, use salts to enhance security. Use Encryption: Consider encrypting sensitive data stored in the database to protect it from unauthorized access, even if the database file is compromised. Implement Key Management: Safeguard encryption keys used for data protection and ensure they are stored securely. Secure Access Controls: Limit access to the local database to authorized users or processes only. |
Hash and Salt Passwords: Implement strong cryptographic hashing algorithms (e.g., bcrypt, scrypt) to securely store passwords in the database. Additionally, use salts to enhance security. Use Encryption: Consider encrypting sensitive data stored in the database to protect it from unauthorized access, even if the database file is compromised. Implement Key Management: Safeguard encryption keys used for data protection and ensure they are stored securely. Secure Access Controls: Limit access to the local database to authorized users or processes only. |
https://cwe.mitre.org/data/definitions/922.html | Step 1: During security assessment it was observed that Sensitive information were stored in application's local database. |