While adding general comments is very useful, some programmers tend to leave important data, such as: filenames related to the web application, old links or links which were not meant to be browsed by users, old code fragments, etc.
An attacker who finds these comments can map the application's structure and files, expose hidden parts of the site, and study the fragments of code to reverse engineer the application, which may help develop further attacks against the site.
cwe_Nature: ChildOf cwe_CWE_ID: 540 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 540 cwe_View_ID: 699 cwe_Ordinal: Primary
|Confidentiality||Read Application Data|
Remove comments which have sensitive information about the design/implementation of the application. Some of the comments may be exposed to the user and affect the security posture of the application.
The following comment, embedded in a JSP, will be displayed in the resulting HTML output.
|CVE-2007-6197||Version numbers and internal hostnames leaked in HTML comments.||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6197|
|CVE-2007-4072||CMS places full pathname of server in HTML comment.||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4072|
|CVE-2009-2431||blog software leaks real username in HTML comment.||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2431|