Home / Vulnerability Database / 1C : Information leak
1C
1C : Information leak
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP MASVS
OWASP ASVS
PCI DSS 4.0
CWE/SANS Top 25 2021
Overview
System configuration information leak is possible. This can help an attacker to plan an attack.
Debug information and error messages can be written to the log, displayed to the console, or sent to the user depending on the system settings. In some cases, an attacker can make a conclusion about the system vulnerabilities from the error message. For example, a database error can indicate insecurity against SQL injection attacks. Information about the version of the operating system, application server and system configuration can also be of value to the attacker.
References
- OWASP Top 10 2013-A5-Security Misconfiguration
- OWASP Top 10 2013-A6-Sensitive Data Exposure
- CWE-497: Exposure of System Data to an Unauthorized Control Sphere
- OWASP Top 10 2017-A3-Sensitive Data Exposure
- OWASP Top 10 2017-A6-Security Misconfiguration
- CWE CATEGORY: OWASP Top Ten 2017 Category A5 - Broken Access Control
- CWE CATEGORY: OWASP Top Ten 2017 Category A6 - Security Misconfiguration
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-209: Generation of Error Message Containing Sensitive Information
- CWE-489
LOW
DerScanner Severity Score
Do you want to fix 1C : Information leak in your application?
See also
1C
1C : Null encryption key
1C
1C : Memory leak
1C
