T 5.165 Unauthorised access to or manipulation of data for web applications

When a web application is operated by a user, data is transmitted and normally saved both on the client and on the server side (e.g. in log files, browser and proxy caches). If this data is not protected appropriately during transmission and saving, it may be read or manipulated by unauthorised persons.

The different transmission routes and storage locations of the data regarding web applications result in specific threats that are explained on the basis of the following examples: