Home / Vulnerability Database / PHP : Unsafe password management
PHP

PHP : Unsafe password management

Overview

The application uses a password stored in plaintext in the configuration file. This can lead to the application data being compromised.

Developers often believe that the data stored in the configuration file is securely protected. This assumption simplifies the attacker’s job. Good password management guidelines require that a password never be stored in plaintext.

MEDIUM

DerScanner Severity Score

Do you want to fix PHP : Unsafe password management in your application?

See also

PHP

PHP : Null salt

PHP

PHP : Empty password

PHP

PHP : Empty salt