CWE-615 通过注释导致的信息暴露
Information Exposure Through Comments
结构: Simple
Abstraction: Variant
状态: Incomplete
被利用可能性: unkown
基本描述
While adding general comments is very useful, some programmers tend to leave important data, such as: filenames related to the web application, old links or links which were not meant to be browsed by users, old code fragments, etc.
扩展描述
An attacker who finds these comments can map the application's structure and files, expose hidden parts of the site, and study the fragments of code to reverse engineer the application, which may help develop further attacks against the site.
相关缺陷
-
cwe_Nature: ChildOf cwe_CWE_ID: 540 cwe_View_ID: 1000 cwe_Ordinal: Primary
-
cwe_Nature: ChildOf cwe_CWE_ID: 540 cwe_View_ID: 699 cwe_Ordinal: Primary
常见的影响
范围 | 影响 | 注释 |
---|---|---|
Confidentiality | Read Application Data |
可能的缓解方案
Distribution
策略:
Remove comments which have sensitive information about the design/implementation of the application. Some of the comments may be exposed to the user and affect the security posture of the application.
示例代码
例
The following comment, embedded in a JSP, will be displayed in the resulting HTML output.
bad JSP
分析过的案例
标识 | 说明 | 链接 |
---|---|---|
CVE-2007-6197 | Version numbers and internal hostnames leaked in HTML comments. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6197 |
CVE-2007-4072 | CMS places full pathname of server in HTML comment. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4072 |
CVE-2009-2431 | blog software leaks real username in HTML comment. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2431 |
文章来源于互联网:scap中文网
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论