debian-mirror-gitlab/doc/user/application_security/dast/checks/359.1.md
2022-11-25 23:54:43 +05:30

1.5 KiB

stage group info
Secure Dynamic Analysis To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments

Exposure of Private Personal Information (PII) to an unauthorized actor (credit card)

Description

The target application was found to return credit card information in the response. Organizations found returning such information may be in violation of industry regulations and could face fines.

Remediation

PII such as credit cards should never be directly returned to the user. The majority of the information should masked except the last few digits or characters of the identifier. For example, credit card numbers should only return the last four digits: ****-****-****-1234. Ensure this masking is done on the server and only then send the masked data back to the client. Do not rely on client side JavaScript or other methods to mask these values as the data could still be intercepted or unmasked.

Additionally, credit card information should never be stored un-encrypted in files or databases.

Details

ID Aggregated CWE Type Risk
359.1 true 359 Passive Medium