Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-210 (通过自主产生的错误消息导致的信息暴露) — Vulnerability Class 2

2 vulnerabilities classified as CWE-210 (通过自主产生的错误消息导致的信息暴露). AI Chinese analysis included.

CWE-210 represents an information disclosure weakness where software generates internal error messages that inadvertently expose sensitive data, such as database schemas, file paths, or stack traces. Attackers typically exploit this vulnerability by triggering specific error conditions, such as invalid inputs or failed authentication attempts, to observe the detailed diagnostic output. This information aids in reconnaissance, allowing adversaries to map the application’s architecture, identify vulnerable endpoints, or craft more precise exploits against underlying systems. To prevent this, developers must implement robust error handling mechanisms that decouple internal logic from user-facing feedback. This involves sanitizing error outputs, logging detailed diagnostics securely for administrative review only, and presenting generic, non-descriptive error messages to end-users. By ensuring that internal state remains hidden during failure scenarios, organizations significantly reduce the attack surface and protect critical system intelligence from malicious actors.

MITRE CWE Description
The product identifies an error condition and creates its own diagnostic or error messages that contain sensitive information.
Common Consequences (1)
ConfidentialityRead Application Data
Mitigations (2)
Implementation, Build and CompilationDebugging information should not make its way into a production release.
Implementation, Build and CompilationDebugging information should not make its way into a production release.
Examples (1)
The following code uses custom configuration files for each user in the application. It checks to see if the file exists on the system before attempting to open and use the file. If the configuration file does not exist, then an error is generated, and the application exits.
$uname = GetUserInput("username"); # avoid CWE-22, CWE-78, others. if ($uname !~ /^\w+$/) { ExitError("Bad hacker!") ; } $filename = "/home/myprog/config/" . $uname . ".txt"; if (!(-e $filename)) { ExitError("Error: $filename does not exist"); }
Bad · Perl
CVE IDTitleCVSSSeverityPublished
CVE-2023-41027 Juplink RX4-1500 Credential Disclosure Vulnerability — RX4-1500 8.0 High2023-09-22
CVE-2021-40126 Cisco Umbrella Email Enumeration Vulnerability — Cisco Umbrella Insights Virtual Appliance 4.3 Medium2021-11-04

Vulnerabilities classified as CWE-210 (通过自主产生的错误消息导致的信息暴露) represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.