Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-497 (将系统数据暴露到未授权控制的范围) — Vulnerability Class 291

291 vulnerabilities classified as CWE-497 (将系统数据暴露到未授权控制的范围). AI Chinese analysis included.

CWE-497 represents a critical information disclosure weakness where software inadvertently exposes sensitive system-level details to unauthorized external entities. This vulnerability typically arises when network-facing applications, such as web servers, fail to sanitize error messages or headers, allowing attackers to glean valuable intelligence about the underlying operating system, database versions, or server configurations. Exploitation often involves analyzing verbose error responses or specific network packets to identify known vulnerabilities in the exposed software stack, facilitating targeted attacks like remote code execution. To mitigate this risk, developers must implement strict error handling protocols that return generic, user-friendly messages instead of detailed stack traces. Additionally, configuring web servers to suppress version information in headers and employing robust input validation ensures that internal system architecture remains obscured from potential adversaries, thereby reducing the attack surface significantly.

MITRE CWE Description
The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does. Network-based products, such as web applications, often run on top of an operating system or similar environment. When the product communicates with outside parties, details about the underlying system are expected to remain hidden, such as path names for data files, other OS users, installed packages, the application environment, etc. This system information may be provided by the product itself, or buried within diagnostic or debugging messages. Debugging information helps an adversary learn about the system and form an attack plan. An information exposure occurs when system data or debugging information leaves the program through an output stream or logging function that makes it accessible to unauthorized parties. Using other weaknesses, an attacker could cause errors to occur; the response to these errors can reveal detailed system information, along with other impacts. An attacker can use messages that reveal technologies, operating systems, and product versions to tune the attack against known vulnerabilities in these technologies. A product may use diagnostic methods that provide significant implementation details such as stack traces as part of its error handling mechanism.
Common Consequences (1)
ConfidentialityRead Application Data
Mitigations (1)
Architecture and Design, ImplementationProduction applications should never use methods that generate internal details such as stack traces and error messages unless that information is directly committed to a log that is not viewable by the end user. All error message text should be HTML entity encoded before being written to the log file to protect against potential cross-site scripting attacks against the viewer of the logs
Examples (2)
The following code prints the path environment variable to the standard error stream:
char* path = getenv("PATH"); ... sprintf(stderr, "cannot find exe on path %s\n", path);
Bad · C
This code prints all of the running processes belonging to the current user.
//assume getCurrentUser() returns a username that is guaranteed to be alphanumeric (avoiding CWE-78) $userName = getCurrentUser(); $command = 'ps aux | grep ' . $userName; system($command);
Bad · PHP
CVE IDTitleCVSSSeverityPublished
CVE-2023-20111 Cisco Identity Services Engine 安全漏洞 — Cisco Identity Services Engine Software 6.5 Medium2023-08-16
CVE-2023-37487 Security misconfiguration vulnerability in SAP Business One (Service Layer) — SAP Business One (Service Layer) 5.3 Medium2023-08-08
CVE-2023-0342 MongoDB Ops Manager may disclose sensitive information in Diagnostic Archive — MongoDB Ops Manager 3.1 Low2023-06-09
CVE-2023-2541 Sensitive information disclosure in KNIME Hub Web Application — KNIME Business Hub 5.3 Medium2023-06-07
CVE-2023-32550 Landscape's Apache server-status is accessible by default — Landscape 9.3 Critical2023-06-06
CVE-2023-0005 PAN-OS: Exposure of Sensitive Information Vulnerability — PAN-OS 4.1 Medium2023-04-12
CVE-2022-34458 多款Dell产品 安全漏洞 — Dell Command Update (DCU) 6.6 Medium2023-02-01
CVE-2022-38710 IBM Robotic Process Automation information disclosure — Robotic Process Automation 5.3 -2022-11-03
CVE-2022-2403 Red Hat OpenShift Container Platform 信息泄露漏洞 — Openshift 6.5 -2022-09-01
CVE-2022-1902 Red Hat stackrox 安全漏洞 — Red Hat Advanced Cluster Security for Kubernetes 8.8 -2022-09-01
CVE-2022-20664 Cisco Email Security Appliance and Cisco Secure Email and Web Manager Information Disclosure Vulnerability — Cisco Email Security Appliance (ESA) 7.7 High2022-06-15
CVE-2022-20734 Cisco SD-WAN vManage Software Information Disclosure Vulnerability — Cisco SD-WAN vManage 4.4 Medium2022-05-04
CVE-2022-28651 JetBrains IntelliJ IDEA 安全漏洞 — IntelliJ IDEA 8.4 High2022-04-05
CVE-2021-0291 Junos OS and Junos OS Evolved: A vulnerability allows a network based unauthenticated attacker which sends a high rate of specific traffic to cause a partial Denial of Service — Junos OS 6.5 Medium2021-07-15
CVE-2021-1544 Cisco Webex Meetings Client Software Logging Information Disclosure Vulnerability — Cisco Webex Meetings 5.5 Medium2021-06-04
CVE-2021-23135 Argo CD leaked secret data into error messages and logs on invalid edits via UI — Argo CD 5.9 Medium2021-05-12
CVE-2021-1535 Cisco SD-WAN vManage Information Disclosure Vulnerability — Cisco SD-WAN vManage 5.3 Medium2021-05-06
CVE-2021-1235 Cisco SD-WAN vManage Information Disclosure Vulnerability — Cisco SD-WAN vManage 5.5 -2021-01-20
CVE-2020-25179 General Electric Healthcare Imaging 和 Ultrasound 信息泄露漏洞 — GE Healthcare Imaging and Ultrasound Products 9.8 -2020-12-14
CVE-2020-26076 Cisco IoT Field Network Director Information Disclosure Vulnerability — Cisco IoT Field Network Director (IoT-FND) 7.5 -2020-11-18
CVE-2019-10243 Eclipse Kura 信息泄露漏洞 — Eclipse Kura 5.3 -2019-04-09

Vulnerabilities classified as CWE-497 (将系统数据暴露到未授权控制的范围) represent 291 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.