Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-209 (通过错误消息导致的信息暴露) — Vulnerability Class 297

297 vulnerabilities classified as CWE-209 (通过错误消息导致的信息暴露). AI Chinese analysis included.

CWE-209 represents a critical information disclosure weakness where software inadvertently exposes sensitive internal details through error messages. This flaw typically occurs when applications return verbose stack traces, database paths, or user-specific data to end-users during failure states. Attackers exploit this by triggering specific errors to gather reconnaissance information, such as server architecture, file structures, or valid user identifiers, which facilitates further targeted attacks like SQL injection or privilege escalation. To mitigate this risk, developers must implement robust error handling mechanisms that separate internal diagnostic logs from user-facing messages. By standardizing generic, non-descriptive error responses for external users while retaining detailed logs for internal debugging, organizations can prevent attackers from leveraging error output to map system vulnerabilities or compromise sensitive data integrity.

MITRE CWE Description
The product generates an error message that includes sensitive information about its environment, users, or associated data.
Common Consequences (1)
ConfidentialityRead Application Data
Often this will either reveal sensitive information which may be used to launch another, more focused attack or disclose private information stored in the server. For example, an attempt to exploit a path traversal weakness (CWE-22) might yield the full pathname of the installed application. In tur…
Mitigations (5)
ImplementationEnsure that error messages only contain minimal details that are useful to the intended audience and no one else. The messages need to strike the balance between being too cryptic (which can confuse users) or being too detailed (which may reveal more than intended). The messages should not reveal the methods that were used to determine the error. Attackers can use detailed information to refine or…
ImplementationHandle exceptions internally and do not display errors containing potentially sensitive information to a user.
ImplementationUse naming conventions and strong types to make it easier to spot when sensitive data is being used. When creating structures, objects, or other complex entities, separate the sensitive and non-sensitive data as much as possible.
Effectiveness: Defense in Depth
Implementation, Build and CompilationDebugging information should not make its way into a production release.
Implementation, Build and CompilationDebugging information should not make its way into a production release.
Examples (2)
In the following example, sensitive information might be printed depending on the exception that occurs.
try { /.../ } catch (Exception e) { System.out.println(e); }
Bad · Java
This code tries to open a database connection, and prints any exceptions that occur.
try { openDbConnection(); } //print exception message that includes exception message and configuration file location catch (Exception $e) { echo 'Caught exception: ', $e->getMessage(), '\n'; echo 'Check credentials in config file at: ', $Mysql_config_location, '\n'; }
Bad · PHP
CVE IDTitleCVSSSeverityPublished
CVE-2023-6944 Rhdh: catalog-import function leaks credentials to frontend — RHDH-1.1-RHEL-9 5.7 Medium2024-01-04
CVE-2023-27319 CVE-2023-27319 Information Disclosure Vulnerability in ONTAP Mediator — ONTAP Mediator 5.3 Medium2023-12-21
CVE-2023-47703 IBM Security Guardium Key Lifecycle Manager information disclosure — Security Guardium Key Lifecycle Manager 5.3 Medium2023-12-20
CVE-2023-42013 IBM UrbanCode Deploy information disclosure — UrbanCode Deploy 5.3 Medium2023-12-19
CVE-2023-6839 WSO2 API Manager 安全漏洞 — WSO2 API Manager 5.3 Medium2023-12-15
CVE-2023-48393 Kaifa Technology WebITR - Error Message Leakage — WebITR 4.3 Medium2023-12-15
CVE-2023-49878 IBM System Storage Virtualization Engine information disclosure — System Storage Virtualization Engine 4.3 Medium2023-12-13
CVE-2023-49080 Jupyter Server errors include tracebacks with path information — jupyter_server 3.5 Low2023-12-04
CVE-2023-43021 IBM InfoSphere Information Server information disclosure — InfoSphere Information Server 5.3 Medium2023-12-01
CVE-2023-47636 Full Path Disclosure via re-export document in pimcore/admin-ui-classic-bundle — admin-ui-classic-bundle 5.3 Medium2023-11-15
CVE-2023-5514 Hitachi eSOMS 安全漏洞 — eSOMS 5.3 Medium2023-11-01
CVE-2023-46240 CodeIgniter4 vulnerable to information disclosure when detailed error report is displayed in production environment — CodeIgniter4 7.5 High2023-10-31
CVE-2022-43891 IBM Security Verify Privilege information disclosure — Security Verify Privilege 2.7 Low2023-10-17
CVE-2023-4457 Grafana 安全漏洞 — google-sheets-datasource 5.5 Medium2023-10-16
CVE-2023-42475 Information Disclosure Vulnerability in Statutory Reporting — SAP S/4HANA Core 4.3 Medium2023-10-10
CVE-2023-0833 Red hat a-mq streams: component version with information disclosure flaw 4.7 Medium2023-09-27
CVE-2023-40725 Siemens QMS Automotive 安全漏洞 — QMS Automotive 4.0 Medium2023-09-12
CVE-2023-37489 Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Version Management System) — SAP BusinessObjects Business Intelligence Platform (Version Management System) 5.3 Medium2023-09-12
CVE-2023-39264 Apache Superset: Stack traces enabled by default — Apache Superset 4.3 Medium2023-09-06
CVE-2023-35124 Open Automation Software OAS Platform 安全漏洞 — OAS Platform 3.1 Low2023-09-05
CVE-2023-33835 IBM Security Verify Information Queue information disclosure — Security Verify Information Queue 4.3 Medium2023-08-31
CVE-2023-33834 IBM Security Verify Information Queue information disclosure — Security Verify Information Queue 4.3 Medium2023-08-31
CVE-2023-26272 IBM Security Guardium Data Encryption information disclosure — Guardium Cloud Key Manager 5.3 Medium2023-08-28
CVE-2023-32755 e-Excellence U-Office Force - Error Message Leakage — U-Office Force 5.3 Medium2023-08-25
CVE-2023-40171 Dispatch writes JWT tokens in error message — dispatch 9.1 Critical2023-08-17
CVE-2023-35009 IBM Cognos Analytics information disclosure — Cognos Analytics 5.3 Medium2023-08-16
CVE-2023-1210 Generation of Error Message Containing Sensitive Information in GitLab — GitLab 3.1 Low2023-08-01
CVE-2023-31429 Multiple commands print sensitive information in the terminal — Fabric OS 5.5 Medium2023-08-01
CVE-2020-4868 IBM TRIRIGA information disclosure — TRIRIGA Application Platform 4.3 Medium2023-07-31
CVE-2023-3362 Generation of Error Message Containing Sensitive Information in GitLab — GitLab 5.3 Medium2023-07-13

Vulnerabilities classified as CWE-209 (通过错误消息导致的信息暴露) represent 297 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.