Product-External Error Message Information Leak |
Weakness ID: 211 (Weakness Base) | Status: Incomplete |
Description Summary
PHP applications are often targeted for having this issue when the PHP interpreter generates the error outside of the application's control. However, it's not just restricted to PHP, as other languages/environments exhibit the same issue. |
Reference | Description |
---|---|
CVE-2004-1581 | chain: product does not protect against direct request of an include file, leading to resultant path disclosure when the include file does not successfully execute. |
CVE-2004-1579 | Single "'" inserted into SQL query leads to invalid SQL query execution, triggering full path disclosure. Possibly resultant from more general SQL injection issue. |
CVE-2005-0459 | chain: product does not protect against direct request of a library file, leading to resultant path disclosure when the file does not successfully execute. |
CVE-2005-0443 | invalid parameter triggers a failure to find an include file, leading to infoleak in error message. |
CVE-2005-0433 | Various invalid requests lead to information leak in verbose error messages describing the failure to instantiate a class, open a configuration file, or execute an undefined function. |
CVE-2004-1101 | Failure to handle filename request with trailing "/" causes multiple consequences, including information leak in Visual Basic error message. |
Phase: System Configuration Configure the application's environment in a way that prevents errors from being generated. For example, in PHP, disable display_errors. |
Phase: Build and Compilation Debugging information should not make its way into a production release. |
Phase: Implementation Handle exceptions internally and do not display errors containing potentially sensitive information to a user. Create default error pages if necessary. |
Phase: Implementation The best way to prevent this weakness during implementation is to avoid any bugs that could trigger the external error message. This typically happens when the program encounters fatal errors, such as a divide-by-zero. You will not always be able to control the use of error pages, and you might not be using a language that handles exceptions. |
Ordinality | Description |
---|---|
Resultant | (where the weakness is typically related to the presence of some other weaknesses) |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 209 | Information Exposure Through an Error Message | Development Concepts (primary)699 Research Concepts (primary)1000 |
CanAlsoBe | ![]() | 550 | Information Leak Through Server Error Message | Research Concepts1000 |
This is inherently a resultant vulnerability from a weakness within the product or an interaction error. |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Product-External Error Message Infoleak |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Applicable Platforms, Relationships, Other Notes, Taxonomy Mappings | ||||
2008-10-14 | CWE Content Team | MITRE | Internal | |
updated Description | ||||
2008-11-24 | CWE Content Team | MITRE | Internal | |
updated Description, Enabling Factors for Exploitation, Functional Areas, Observed Examples, Other Notes, Potential Mitigations, Relationship Notes, Weakness Ordinalities |