Description
The application performs an operation that triggers an external diagnostic or error message that is not directly generated or controlled by the application, such as an error generated by the programming language interpreter that the software uses. The error can contain sensitive system information.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Confidentiality: Read Application Data
Potential Mitigations
Phase: System Configuration
Description:
Configure the application’s environment in a way that prevents errors from being generated. For example, in PHP, disable display_errors.
Phase: Implementation, Build and Compilation
Description:
Debugging information should not make its way into a production release.
Phase: Implementation, Build and Compilation
Description:
Debugging information should not make its way into a production release.
Phase: Implementation
Description:
Handle exceptions internally and do not display errors containing potentially sensitive information to a user. Create default error pages if necessary.
Phase: Implementation
Description:
The best way to prevent this weakness during implementation is to avoid any bugs that could trigger the external error message. This typically happens when the program encounters fatal errors, such as a divide-by-zero. You will not always be able to control the use of error pages, and you might not be using a language that handles exceptions.
CVE References
- CVE-2004-1581
- chain: product does not protect against direct request of an include file, leading to resultant path disclosure when the include file does not successfully execute.
- CVE-2004-1579
- Single “‘” inserted into SQL query leads to invalid SQL query execution, triggering full path disclosure. Possibly resultant from more general SQL injection issue.
- CVE-2005-0459
- chain: product does not protect against direct request of a library file, leading to resultant path disclosure when the file does not successfully execute.
- CVE-2005-0443
- invalid parameter triggers a failure to find an include file, leading to infoleak in error message.
- CVE-2005-0433
- Various invalid requests lead to information leak in verbose error messages describing the failure to instantiate a class, open a configuration file, or execute an undefined function.
- CVE-2004-1101
- Improper handling of filename request with trailing “/” causes multiple consequences, including information leak in Visual Basic error message.
More Stories
The Most Dangerous Vulnerabilities in Apache Tomcat and How to Protect Against Them
Apache Tomcat is an open-source web server and servlet container that is widely used in enterprise environments to run Java...
ZDI-CAN-18333: A Critical Zero-Day Vulnerability in Microsoft Windows
Zero-day vulnerabilities are a serious threat to cybersecurity, as they can be exploited by malicious actors to gain unauthorized access...
CWE-669 – Incorrect Resource Transfer Between Spheres
Description The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere,...
CWE-67 – Improper Handling of Windows Device Names
Description The software constructs pathnames from user input, but it does not handle or incorrectly handles a pathname containing a...
CWE-670 – Always-Incorrect Control Flow Implementation
Description The code contains a control flow path that does not reflect the algorithm that the path is intended to...
CWE-671 – Lack of Administrator Control over Security
Description The product uses security features in a way that prevents the product's administrator from tailoring security settings to reflect...