Home / Vulnerability Database / Pascal : Hardcoded password
Pascal
Pascal : Hardcoded password
Classification
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
HIPAA
Overview
Password is hardcoded. This may lead to an application data compromise.
Eliminating security risks related to hardcoded passwords is extremely difficult. These passwords are at least accessible to every developer of the application. Moreover, after the application is installed, removing password from its code is possible only via an update. Constant strings are easily extracted from the compiled application by decompilers. Therefore, an attacker does not necessarily need to have an access to the source code to know the parameters of the special account. If these parameters become known to an attacker, system administrators will be forced either to neglect the safety, or to restrict the access to the application.
References
- Use of hard-coded password
- CWE-259: Use of Hard-coded Password
- OWASP Top 10 2013-A5-Security Misconfiguration
- OWASP Top 10 2013-A6-Sensitive Data Exposure
- Handling passwords used for auth in source code - stackoverflow.com
- How to securely hash passwords? - security.stackexchange.com
- OWASP Top 10 2017 A2-Broken Authentication
- OWASP Top 10 2017-A3-Sensitive Data Exposure
- CWE-798: Use of Hard-coded Credentials
MEDIUM
DerScanner Severity Score
Do you want to fix Pascal : Hardcoded password in your application?
See also
Pascal
Pascal : Error handling: generic exception
Pascal
Pascal : Undocumented feature: special account
Pascal
