Leakage of sensitive data in local storage
Overview
Rule ID:
javascript_lang_sessionApplicable Languages: Javascript
Weakness ID: CWE-312
Description
Storing sensitive data in localStorage presents a security risk. This vulnerability arises when sensitive information is kept in the browser's local storage, leaving it exposed to unauthorized access.
Remediation Guidelines
Avoid storing sensitive data in
localStorage. This practice exposes sensitive information to potential security vulnerabilities.localStorage.setItem('user', email); // insecureUse server-based session storage solutions to keep session data secure. This method reduces the risk of sensitive data exposure.
Store only non-sensitive data in
localStorage, such as a unique identifier, to mitigate security risks.localStorage.setItem('user', user.uuid);
References
Configuration
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL
Last updated