Home / Vulnerability Database / Config files : Unsafe password management
Config files
Config files : Unsafe password management
Classification
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
CWE/SANS Top 25 2021
Overview
The application uses a password stored in plaintext or a bad hashed password in the configuration file. This can lead to the application data being compromised.
Developers often believe that the data stored in the configuration file is securely protected. This assumption simplifies the attacker’s job. Good password management guidelines require that a password never be stored in plaintext.
References
- OWASP Top 10 2017-A2-Broken Authentication
- OWASP Top 10 2017-A3-Sensitive Data Exposure
- OWASP Top 10 2013-A5-Security Misconfiguration
- OWASP Top 10 2013-A6-Sensitive Data Exposure
- CWE-261: Weak Encoding for Password
- CWE CATEGORY: OWASP Top Ten 2017 Category A2 - Broken Authentication
- CWE CATEGORY: OWASP Top Ten 2017 Category A6 - Security Misconfiguration
- CWE-256: Unprotected Storage of Credentials
- CWE-260: Password in Configuration File
MEDIUM
DerScanner Severity Score
Do you want to fix Config files : Unsafe password management in your application?
See also
Config files
Config files : Text4Shell Vulnerability
Config files
Config files : Incorrect directory deletion
Config files
