Information Leak Semantic Template
Information Leak Semantic Template
Fault
Failure to safeguard internal state
203
Example Code:
Failure to follow safe programming practices
498
499
Failure to remove sensitive information from debug code
215
8
492
618
749
767
488
495
766
485
Failure to sanitze error message
209
81
Missing custom error page
756
Improper exception handling
600
390
7
Improper use or implementation of cryptography
310
330
327
326
Failure to encrypt sensitive data
311
Plaintext storage of sensitive information
313-318
Cleartext storage of sensitive information
312
319
Permitting data queries that allow inferencing
202
Intended information leak
213
Putting sensitive information in wrong place
526
497
214
591
publicly accessible output stream
process paramter list
Failure to secure data channel
201
Improper cleansing of sensitive data
212
Failure to clear heap memory
244
Failure to clear cache
524
Insufficient session expiration
613
Improper access or listing or exposure of files and directories
538
782
378
412
708
Misconfiguration of tool
14
Incorrect permission or access control
285
276
266
269
284
286
689
648
Resource/Locations
File and directory
538
CVS repository 527
Core dump 528
Access control lists 529
Backup files 530
Log files 532
Server logs 533
Debug logs 534
Cleanup logs 542
Persistent cookies 539
Source code 540
Test code 531
Include source 541
Source code comments 615
Directory listing 548
XML External entity 611
WSDL file 651
Data channel
201
Cache
524
Browser cache 525
Memory heap
244
Process invocation elements
214
Process parameters
Process environments
Debug information
215
Sensitive information
200
User information
202
Credentials
255
System data
497
OS environment variables
526
Error message
209
Product generated 210
Shell error message 535
Servlet runtime error message 536
Java runtime error message 537
Server error message 550
Product-external 211
Indices
612
Internal state
203
204
205
206
207
208
Covert channel
385
514
515
Consequences
Sensitive information exposure to unauthorized parties
(leads to)
Privacy violation
credit card
health records
359
Further attack
password
Denial of service
Unauthorized access to system
200
Weakness
Expose sensitive information
200
Exposure of sensitive information due to inference or discrepancy
203
202
Exposure of resource to wrong sphere
668
402
610
669
673