Home / Vulnerability Database / Java : Unsafe password management
Java
Java : Unsafe password management
Classification
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
Overview
The application uses a password stored in plaintext in the configuration file. This can lead to the application data being compromised.
Developers often believe that the data stored in the configuration file is securely protected. This assumption simplifies the attacker’s job. Good password management guidelines require that a password never be stored in plaintext.
References
- OWASP Top 10 2017-A2-Broken Authentication
- OWASP Top 10 2017-A3-Sensitive Data Exposure
- OWASP Top 10 2013-A5-Security Misconfiguration
- OWASP Top 10 2013-A6-Sensitive Data Exposure
- CWE-261: Weak Encoding for Password
- CWE CATEGORY: OWASP Top Ten 2017 Category A2 - Broken Authentication
- CWE CATEGORY: OWASP Top Ten 2017 Category A6 - Security Misconfiguration
MEDIUM
DerScanner Severity Score
Do you want to fix Java : Unsafe password management in your application?
See also
Java
Java : Race condition
Java
Java : Text4Shell Vulnerability
Java
