Intended Information Leak |
Weakness ID: 213 (Weakness Base) | Status: Draft |
Description Summary
Example 1
The JSP code listed below displays a user's credit card and social security numbers in a browser window (even though they aren't absolutely necessary).
Reference | Description |
---|---|
CVE-2002-1725 | Script calls phpinfo() |
CVE-2004-0033 | Script calls phpinfo() |
CVE-2003-1181 | Script calls phpinfo() |
CVE-2004-1422 | Script calls phpinfo() |
CVE-2004-1590 | Script calls phpinfo() |
CVE-2003-1038 | Product lists DLLs and full pathnames. |
CVE-2005-1205 | Telnet protocol allows servers to obtain sensitive environment information from clients. |
CVE-2005-0488 | Telnet protocol allows servers to obtain sensitive environment information from clients. |
Compartmentalize your system to have "safe" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area. Consider what information might be regarded as sensitive by your product's users, even if it is not important for the safe operation of your system. |
This overlaps other categories, but it is distinct from the error message infoleaks. It's not always clear whether an infoleak is intentional or not. For example, CVE-2005-3261 identifies a PHP script that lists file versions, but it could be that the developer did not intend for this information to be public, but introduced a direct request issue instead. In vulnerability theory terms, this covers cases in which the developer's Intended Policy allows the information to be made available, but the information might be in violation of a Universal Policy in which the product's administrator should have control over which |
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ChildOf | Weakness Class | 200 | Information Exposure | Development Concepts (primary)699 Research Concepts (primary)1000 |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Sean Eidemiller | Cigital | External | |
added/updated demonstrative examples | ||||
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Other Notes, Taxonomy Mappings |