CWE-615 通过注释导致的信息暴露

admin 2021年12月4日16:18:05评论73 views字数 1361阅读4分32秒阅读模式

CWE-615 通过注释导致的信息暴露

Information Exposure Through Comments

结构: Simple

Abstraction: Variant

状态: Incomplete

被利用可能性: unkown

基本描述

While adding general comments is very useful, some programmers tend to leave important data, such as: filenames related to the web application, old links or links which were not meant to be browsed by users, old code fragments, etc.

扩展描述

An attacker who finds these comments can map the application's structure and files, expose hidden parts of the site, and study the fragments of code to reverse engineer the application, which may help develop further attacks against the site.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 540 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 540 cwe_View_ID: 699 cwe_Ordinal: Primary

常见的影响

范围 影响 注释
Confidentiality Read Application Data

可能的缓解方案

Distribution

策略:

Remove comments which have sensitive information about the design/implementation of the application. Some of the comments may be exposed to the user and affect the security posture of the application.

示例代码

The following comment, embedded in a JSP, will be displayed in the resulting HTML output.

bad JSP

分析过的案例

标识 说明 链接
CVE-2007-6197 Version numbers and internal hostnames leaked in HTML comments. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6197
CVE-2007-4072 CMS places full pathname of server in HTML comment. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4072
CVE-2009-2431 blog software leaks real username in HTML comment. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2431

文章来源于互联网:scap中文网

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年12月4日16:18:05
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-615 通过注释导致的信息暴露http://cn-sec.com/archives/613444.html

发表评论

匿名网友 填写信息