CWE-615 通过注释导致的信息暴露

Information Exposure Through Comments

结构: Simple

Abstraction: Variant

状态: Incomplete

被利用可能性: unkown


While adding general comments is very useful, some programmers tend to leave important data, such as: filenames related to the web application, old links or links which were not meant to be browsed by users, old code fragments, etc.


An attacker who finds these comments can map the application's structure and files, expose hidden parts of the site, and study the fragments of code to reverse engineer the application, which may help develop further attacks against the site.


  • cwe_Nature: ChildOf cwe_CWE_ID: 540 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 540 cwe_View_ID: 699 cwe_Ordinal: Primary


范围 影响 注释
Confidentiality Read Application Data




Remove comments which have sensitive information about the design/implementation of the application. Some of the comments may be exposed to the user and affect the security posture of the application.


The following comment, embedded in a JSP, will be displayed in the resulting HTML output.

bad JSP

<!-- FIXME: calling this with more than 30 args kills the JDBC server -->


标识 说明 链接
CVE-2007-6197 Version numbers and internal hostnames leaked in HTML comments.
CVE-2007-4072 CMS places full pathname of server in HTML comment.
CVE-2009-2431 blog software leaks real username in HTML comment.