Leakage of Sensitive Information in Exception Messages
Overview
Rule ID:
java_lang_information_leakage
Applicable Languages: Java
Weakness ID: CWE-209
Description
Exception messages that expose sensitive information can be a critical security vulnerability. When exception details are printed directly to the default output, they might reveal crucial information about the application’s configuration or environment, such as file paths, server details, or database configurations. This not only aids attackers in identifying potential entry points but also risks exposing user-specific data, leading to privacy violations.
Risks
Security Risks: Revealing system information can aid attackers in crafting more effective attacks, such as path traversal.
Privacy Risks: User-specific information in exception messages can lead to serious privacy breaches.
Remediation Guidelines
Avoid Printing Stack Traces: Refrain from printing full stack traces to the console or logs that are accessible to users.
Provide General Error Messages: Ensure that error messages are generic and do not include sensitive information.
References
Configuration
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL
Last updated