Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-223 (安全相关信息的遗漏) — Vulnerability Class 8

8 vulnerabilities classified as CWE-223 (安全相关信息的遗漏). AI Chinese analysis included.

CWE-223 represents a critical design flaw where software fails to record or display essential security-related information, thereby obscuring the source or nature of potential attacks. This omission typically allows attackers to evade detection and forensic analysis, as the absence of audit trails or contextual logs prevents administrators from identifying malicious activity or verifying the safety of system actions. Consequently, incidents remain invisible until significant damage occurs, complicating incident response and remediation efforts. To mitigate this weakness, developers must implement comprehensive logging mechanisms that capture detailed context for all security-sensitive operations. By ensuring that every critical action generates sufficient diagnostic data, organizations can maintain visibility into system behavior, enabling rapid threat identification and robust security monitoring without compromising operational efficiency.

MITRE CWE Description
The product does not record or display information that would be important for identifying the source or nature of an attack, or determining if an action is safe.
Common Consequences (1)
Non-RepudiationHide Activities
The source of an attack will be difficult or impossible to determine. This can allow attacks to the system to continue without notice.
Examples (2)
This code logs suspicious multiple login attempts.
function login($userName,$password){ if(authenticate($userName,$password)){ return True; } else{ incrementLoginAttempts($userName); if(recentLoginAttempts($userName) > 5){ writeLog("Failed login attempt by User: " . $userName . " at " + date('r') ); } } }
Bad · PHP
This code prints the contents of a file if a user has permission.
function readFile($filename){ $user = getCurrentUser(); $realFile = $filename; //resolve file if its a symbolic link if(is_link($filename)){ $realFile = readlink($filename); } if(fileowner($realFile) == $user){ echo file_get_contents($realFile); return; } else{ echo 'Access denied'; writeLog($user . ' attempted to access the file '. $filename . ' on '. date('r')); } }
Bad · PHP

Vulnerabilities classified as CWE-223 (安全相关信息的遗漏) represent 8 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.