Information Leak Through Server Log Files |
Weakness ID: 533 (Weakness Variant) | Status: Incomplete |
Description Summary
A server.log file was found. This can give information on whatever application left the file. Usually this can give full path names and system information, and sometimes usernames and passwords.
Consider seriously the sensitivity of the information written into log files. Do not write secrets into the log files. |
Protect log files against unauthorized read/write. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 532 | Information Leak Through Log Files | Development Concepts (primary)699 Research Concepts (primary)1000 |
ChildOf | ![]() | 552 | Files or Directories Accessible to External Parties | Development Concepts699 |
ChildOf | ![]() | 632 | Weaknesses that Affect Files or Directories | Resource-specific Weaknesses (primary)631 |
ChildOf | ![]() | 731 | OWASP Top Ten 2004 Category A10 - Insecure Configuration Management | Weaknesses in OWASP Top Ten (2004) (primary)711 |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
Anonymous Tool Vendor (under NDA) | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Potential Mitigations, Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Taxonomy Mappings | ||||
2009-03-10 | CWE Content Team | MITRE | Internal | |
updated Relationships |