Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
NSURLCredential
which will be distributed to all synchronized devices and stored in Apple's iCloud environment.NSURLCredential
containing the user's credentials in the form or a username/password pair or a client certificate, a persistence attribute needs to be defined. The possible values are:NSURLCredentialPersistenceNone
: Credential should not be stored.NSURLCredentialPersistenceForSession
: Credential should be stored only for this session.NSURLCredentialPersistencePermanent
: Credential should be stored in the Keychain.NSURLCredentialPersistenceSynchronizable
: Credential should be stored permanently in the Keychain, and in addition should be distributed to other devices based on the owning Apple ID.NSURLCredentialPersistenceSynchronizable
attribute implies the distribution of the credential and its storage in the Apple's cloud environment. Depending upon the privacy requirements of the application, storing the credential in the Apple cloud environment may not be acceptable.
...
NSURLCredential *credential = [NSURLCredential credentialWithUser:user password:password persistence:NSURLCredentialPersistenceSynchronizable];
NSURLCredentialStorage *shared = [NSURLCredentialStorage sharedCredentialStorage];
[shared setDefaultCredential:credential forProtectionSpace:protectionSpace];
...
NSURLCredential
which will be distributed to all synchronized devices and stored in Apple's iCloud environment.NSURLCredential
containing the user's credentials in the form or a username/password pair or a client certificate, a persistence attribute needs to be defined. The possible values are:NSURLCredentialPersistenceNone
: Credential should not be stored.NSURLCredentialPersistenceForSession
: Credential should be stored only for this session.NSURLCredentialPersistencePermanent
: Credential should be stored in the Keychain.NSURLCredentialPersistenceSynchronizable
: Credential should be stored permanently in the Keychain, and in addition should be distributed to other devices based on the owning Apple ID.NSURLCredentialPersistenceSynchronizable
attribute implies the distribution of the credential and its storage in the Apple's cloud environment. Depending upon the privacy requirements of the application, storing the credential in the Apple cloud environment may not be acceptable.
...
let credential = NSURLCredential(user:foo, password:password, persistence:.Synchronizable)
let shared = NSURLCredentialStorage.sharedCredentialStorage()
shared.setCredential(credential, forProtectionSpace:protectionSpace)
...
DataVisualization
control that generates a graph of sensitive financial information from the XML Data Source SensitiveXMLData
:
<asp:Chart ID="Chart1" runat="server" ImageLocation="~/Temporary/Graph"
ImageType="Jpeg" DataSourceID="SensitiveXMLData" ImageStorageMode="UseImageLocation">
<series>
.
.
.
</series>
<chartareas>
<asp:ChartArea Name="ChartArea1">
</asp:ChartArea>
</chartareas>
</asp:Chart>
Example 1
instructs the Chart
control to produce a JPEG image of the bar graph and write it to the temporary directory ~/Temporary/Graph
. After the control writes the image to disk, the user's browser will make a subsequent request of the file and display it to the user. The image is not written securely to disk. Also, the code assumes that the underlying infrastructure will protect the file from unauthorized access by another user.NSURLCredential
instance locally but fails to remove the copy stored on other devices and iCloud.NSURLCredential
containing the user's credentials in the form or a username/password pair or a client certificate, a persistence attribute needs to be defined. The possible values are:NSURLCredentialPersistenceNone
: Credential should not be stored.NSURLCredentialPersistenceForSession
: Credential should be stored only for this session.NSURLCredentialPersistencePermanent
: Credential should be stored in the Keychain.NSURLCredentialPersistenceSynchronizable
: Credential should be stored permanently in the Keychain, and in addition should be distributed to other devices based on the owning AppleID.NSURLCredentialPersistenceSynchronizable
credentials are distributed to other devices and iCloud, failing to completely remove the credential from all places will leave instances that could be leaked.
...
// Create the credential
NSURLCredential *credential = [NSURLCredential credentialWithUser:user password:password persistence:NSURLCredentialPersistenceSynchronizable];
NSURLCredentialStorage *shared = [NSURLCredentialStorage sharedCredentialStorage];
[shared setDefaultCredential:credential forProtectionSpace:protectionSpace];
// Use the credential as needed
...
// Removes the credential
[shared removeCredential:credential forProtectionSpace:protectionSpace];
...
NSURLCredential
instance locally but fails to remove the copy stored on other devices and iCloud.NSURLCredential
containing the user's credentials in the form or a username/password pair or a client certificate, a persistence attribute needs to be defined. The possible values are:NSURLCredentialPersistenceNone
: Credential should not be stored.NSURLCredentialPersistenceForSession
: Credential should be stored only for this session.NSURLCredentialPersistencePermanent
: Credential should be stored in the Keychain.NSURLCredentialPersistenceSynchronizable
: Credential should be stored permanently in the Keychain, and in addition should be distributed to other devices based on the owning AppleID.NSURLCredentialPersistenceSynchronizable
credentials are distributed to other devices and iCloud, failing to completely remove the credential from all places will leave instances that could be leaked.
...
// Create the credential
let credential = NSURLCredential(user:foo, password:password, persistence:.Synchronizable)
let shared = NSURLCredentialStorage.sharedCredentialStorage()
shared.setCredential(credential, forProtectionSpace:protectionSpace)
// Use the credential as needed
...
// Removes the credential
shared.removeCredential(credential, forProtectionSpace:protectionSpace)
...
MyCreditCard
key stores a user-supplied plain text credit card number associated with the account.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>password</key>
<string>BASICSECRET</string>
<key>credentials</key>
<dict>
<key>pin</key>
<string>2345</string>
<key>MyCreditCard</key>
<string>1111 11 2321 1112</string>
<key>MysSn</key>
<string>1111-22-3333</string>
<key>ssn</key>
<string>2345-22-3345</string>
<key>userid</key>
<string>12345</string>
</dict>
</dict>
</plist>
Example 1
stores private user information from the mobile device in an unprotected plist file stored on the device. Although many developers trust plist files as a safe storage location for any and all data, it should not be trusted implicitly particularly when privacy is a concern, since plist files may be read by anyone in possession of the device.
ViewController.h
...
@property (nonatomic, retain) IBOutlet UITextField *ssnField;
...
Example 1
indicates that the app utilizes an input control designed to collect sensitive information. As iOS caches input into text fields in order to improve the performance of its autocorrection feature, any information recently entered into such an input control may be cached within a keyboard cache file saved to the file system. Because the keyboard cache file is stored on the device, if the device is lost, it may be recovered, thereby revealing any sensitive information contained within.
...
@IBOutlet weak var ssnField: UITextField!
...
Example 1
indicates that the app utilizes an input control designed to collect sensitive information. As iOS caches input into text fields in order to improve the performance of its autocorrection feature, any information recently entered into such an input control may be cached within a keyboard cache file saved to the file system. Because the keyboard cache file is stored on the device, if the device is lost, it may be recovered, thereby revealing any sensitive information contained within.@secure()
decorator, so the value will be saved to the deployment history and logs.@secure()
decorator.
@description('Provide the password')
param password string
Example 1
will result in the password
parameter being saved to the deployment history and logs.
ViewController.h
...
@property (nonatomic, retain) IBOutlet UITextField *ssnField;
...
Example 1
indicates that the app utilizes an input control designed to collect sensitive information. As iOS takes a screenshot of the active view of an app when it is backgrounded in order to improve animation performance, any information displayed in such input controls during the background event may be cached within an image saved to the file system. Because these screen cache screenshots are stored on the device, if the device is lost, they may be recovered, thereby revealing any sensitive information contained within.
...
@IBOutlet weak var ssnField: UITextField!
...
Example 1
indicates that the app utilizes an input control designed to collect sensitive information. As iOS takes a screenshot of the active view of an app when it is backgrounded in order to improve animation performance, any information displayed in such input controls during the background event may be cached within an image saved to the file system. Because these screen cache screenshots are stored on the device, if the device is lost, they may be recovered, thereby revealing any sensitive information contained within.Documents
directory without properly masking it first.Documents
directory is intended to store non-transient application data, such as user-created content or local information allowing the app to run in offline mode. If UIFileSharingEnabled
is set in your application's Info.plist
file, files here will be accessible via iTunes. When writing sensitive data to the Documents
directory, the data may be exposed in unencrypted backups or through the iTunes interface.Documents
directory:
...
NSString *docsDirectory = [NSSearchPathForDirectoriesInDomains(NSDocumentDirectory, NSUserDomainMask, YES) objectAtIndex:0];
NSString *passwd_path = [docsDirectory stringByAppendingPathComponent:@"passwords.txt"];
NSString *password = [user password];
[password writeToFile:passwd_path atomically:YES encoding:NSUTF8StringEncoding error:nil];
...
Documents
directory without properly masking it first.Documents
directory is intended to store non-transient application data, such as user-created content or local information allowing the app to run in offline mode. If UIFileSharingEnabled
is set in your application's Info.plist
file, files here will be accessible via iTunes. When writing sensitive data to the Documents
directory, the data may be exposed in unencrypted backups or through the iTunes interface.Documents
directory:
let documents = NSSearchPathForDirectoriesInDomains(.DocumentDirectory, .UserDomainMask, true)[0] as String
let passwd_path = NSURL(fileURLWithPath: documents).URLByAppendingPathComponent("secret.txt")
let password = getUserPassword()
try password.writeToURL(passwd_path, atomically:true, encoding: NSUTF8StringEncoding)
DataType
as a password, meaning that by default it will be shown when displayed:
public class User
{
[Required]
public int ID { get; set; }
public string Title { get; set; }
[DataType(DataType.Date)]
[DisplayFormat(DataFormatString = "{0:yyyy-MM-dd}", ApplyFormatInEditMode = true)]
public DateTime DateOfEmployment { get; set; }
[DataType(DataType.Currency)]
public decimal Salary { get; set; }
[Required]
public string Username { get; set; }
[Required]
public string Password { get; set; }
...
}
Password
in Example 1
did not specify the attribute [DataType(DataType.Password)]
, it will not be hidden by default when displayed in the UI.TextField
widget does not obscure a user's password as they type it at the input prompt:
class SelectionContainerDisabledExampleApp extends StatelessWidget {
const SelectionContainerDisabledExampleApp({super.key});
@override
Widget build(BuildContext context) {
return MaterialApp(
home: Scaffold(
body: Center(
child: Column(
children: <Widget>[
TextField(
decoration: InputDecoration(
hintText: "Please enter your password",
),
),
],
),
),
),
);
}
}
TextField
widget in Example 1
was not instantiated with obscureText
property, set to true
, the password is not obscured when the user types it at the "Please enter your password: " prompt.PasswordCallback pc = new PasswordCallback("Please enter your password: ", true);
pc
in Example 1
was instantiated with its second parameter, onEcho
, set to true
, the password is not obscured when the user types it at the "Please enter your password: " prompt.
ViewController.h:
...
@property (nonatomic, retain) IBOutlet UITextField *passwordField;
...
ViewController.m:
...
NSString *password = _passwordField.text;
...
passwordField
in Example 1
did not have its secureTextEntry
property set to true
, the password is not obscured when the user types it into the text field.
...
@IBOutlet weak var passwordField: UITextField!
...
let password = passwordField.text
...
passwordField
in Example 1
did not have its secureTextEntry
property set to true
, the password is not obscured when the user types it into the text field.
from oslo_config import cfg
...
opts = [
cfg.StrOpt('admin_password',secret=False,
help="User's password")]
...
grp = cfg.OptGroup('mygroup')
cfg.CONF.register_opts(opts, group=grp)
...
logger.warning("Adding %s" % cfg.CONF.mygroup.admin_password)
Example 1
writes admin_password
in plain text (unobfuscated) to the log output, as the value of secret
is set to False
. Although many developers trust the eventlog as a safe storage location for data, it should not be trusted implicitly, particularly when privacy is a concern.<uses-permission .../>
element of AndroidManifest.xml declares usage of the ACTIVITY_RECOGNITION
permission, which enables an application to recognize the user's physical activity.<uses-permission android:name="android.permission.ACTIVITY_RECOGNITION"/>
<uses-permission .../>
element of AndroidManifest.xml declares usage of the READ_CALENDAR
permission, which enables an application to read the user's calendar data.<uses-permission android:name="android.permission.READ_CALENDAR"/>Example 2: The
<uses-permission .../>
element of AndroidManifest.xml declares usage of the WRITE_CALENDAR
permission, which enables an application to write to the user's calendar data.<uses-permission android:name="android.permission.WRITE_CALENDAR"/>
<uses-permission .../>
element of AndroidManifest.xml declares usage of the READ_CALL_LOG
permission, which enables an application to read the user's call log.<uses-permission android:name="android.permission.READ_CALL_LOG"/>Example 2: The
<uses-permission .../>
element of AndroidManifest.xml declares usage of the WRITE_CALL_LOG
permission, which enables an application to write to the user's call log.<uses-permission android:name="android.permission.WRITE_CALL_LOG"/>
<uses-permission .../>
element of AndroidManifest.xml declares usage of the CAMERA
permission, which enables an application to access the device's camera.<uses-permission android:name="android.permission.CAMERA"/>
<uses-permission .../>
element of AndroidManifest.xml declares usage of the READ_CONTACTS
permission, which enables an application to read the user's contacts data.<uses-permission android:name="android.permission.READ_CONTACTS"/>Example 2: The
<uses-permission .../>
element of AndroidManifest.xml declares usage of the WRITE_CONTACTS
permission, which enables an application to write to the user's contacts data.<uses-permission android:name="android.permission.WRITE_CONTACTS"/>Example 3: The
<uses-permission .../>
element of AndroidManifest.xml declares usage of the GET_ACCOUNTS
permission, which enables an application to access the user's email and online accounts stored in the Account Manager. Sensitive data such as account IDs, email addresses, and phone numbers can be accessed with this permission.<uses-permission android:name="android.permission.GET_ACCOUNTS"/>
<uses-permission .../>
element of AndroidManifest.xml declares usage of the WRITE_EXTERNAL_STORAGE
permission, which enables an application to write to external storage.<uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"/>Example 2:The
<uses-permission .../>
element of AndroidManifest.xml declares usage of the READ_EXTERNAL_STORAGE
permission, which enables and application to read from external storage.<uses-permission android:name="android.permission.READ_EXTERNAL_STORAGE"/>