CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere

Base Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.

常见后果

影响范围: Confidentiality

技术影响: Read Application Data

潜在缓解措施

阶段: Architecture and Design Implementation

描述: Production applications should never use methods that generate internal details such as stack traces and error messages unless that information is directly committed to a log that is not viewable by the end user. All error message text should be HTML entity encoded before being written to the log file to protect against potential cross-site scripting attacks against the viewer of the logs

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2021-32638

Code analysis product passes access tokens as a command-line parameter or through an environment variable, making them visible to other processes via the ps command.

引入模式

阶段 说明
Implementation -

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
7 Pernicious Kingdoms - System Information Leak -
The CERT Oracle Secure Coding Standard for Java (2011) ERR01-J Do not allow exceptions to expose sensitive information -
Software Fault Patterns SFP23 Exposed Data -
关键信息

CWE ID: CWE-497

抽象级别: Base

结构: Simple

状态: Incomplete

相关弱点
相关攻击模式
CAPEC-170 CAPEC-694