Home / Vulnerability Database / Kotlin : Unsafe password management
Kotlin
Kotlin : Unsafe password management
Classification
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
Overview
The application uses a password stored in plaintext in the configuration file. This can lead to the application data being compromised.
Developers often believe that the data stored in the configuration file is securely protected. This assumption simplifies the attacker’s job. Good password management guidelines require that a password never be stored in plaintext.
References
- OWASP Top 10 2017-A2-Broken Authentication
- OWASP Top 10 2017-A3-Sensitive Data Exposure
- OWASP Top 10 2013-A5-Security Misconfiguration
- OWASP Top 10 2013-A6-Sensitive Data Exposure
- CWE-261: Weak Encoding for Password
- CWE CATEGORY: OWASP Top Ten 2017 Category A2 - Broken Authentication
- CWE CATEGORY: OWASP Top Ten 2017 Category A6 - Security Misconfiguration
MEDIUM
DerScanner Severity Score
Do you want to fix Kotlin : Unsafe password management in your application?
See also
Kotlin
Kotlin : Missing required cryptographic step
Kotlin
Kotlin : Logging into system output
Kotlin
