Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-532 (通过日志文件的信息暴露) — Vulnerability Class 604

604 vulnerabilities classified as CWE-532 (通过日志文件的信息暴露). AI Chinese analysis included.

CWE-532 represents a critical information disclosure weakness where software inadvertently records sensitive data, such as passwords, credit card numbers, or personal identifiers, into log files. This vulnerability is typically exploited by attackers who gain access to these logs through insufficient file permissions, insecure storage practices, or compromised administrative accounts. Once accessed, the exposed data can be harvested for identity theft, financial fraud, or further system intrusion. To prevent this, developers must implement strict data sanitization protocols, ensuring that sensitive fields are masked or excluded before logging. Additionally, employing robust access controls and encryption for log storage, alongside regular audits of logging configurations, helps mitigate the risk of accidental exposure. By treating log files as potential repositories of confidential information, organizations can significantly reduce their attack surface and maintain compliance with data protection standards.

MITRE CWE Description
The product writes sensitive information to a log file.
Common Consequences (1)
ConfidentialityRead Application Data
Logging sensitive user data, full path names, or system information often provides attackers with an additional, less-protected path to acquiring the information.
Mitigations (4)
Architecture and Design, ImplementationConsider seriously the sensitivity of the information written into log files. Do not write secrets into the log files.
DistributionRemove debug log files before deploying the application into production.
OperationProtect log files against unauthorized read/write.
ImplementationAdjust configurations appropriately when software is transitioned from a debug state to production.
Examples (2)
In the following code snippet, a user's full name and credit card number are written to a log file.
logger.info("Username: " + usernme + ", CCN: " + ccn);
Bad · Java
This code stores location information about the current user:
locationClient = new LocationClient(this, this, this); locationClient.connect(); currentUser.setLocation(locationClient.getLastLocation()); ... catch (Exception e) { AlertDialog.Builder builder = new AlertDialog.Builder(this); builder.setMessage("Sorry, this application has experienced an error."); AlertDialog alert = builder.create(); alert.show(); Log.e("ExampleActivity", "Caught exception: " + e + " While on User:" + User.toString()); }
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2021-32724 check-spelling workflow vulnerable to GITHUB_TOKEN leakage via symlink attack — check-spelling 9.9 Critical2021-09-09
CVE-2021-32801 Exceptions may have logged Encryption-at-Rest key content in Nextcloud server — security-advisories 5.5 Medium2021-09-07
CVE-2021-27022 Puppet Server 日志信息泄露漏洞 — Puppet Enterprise 4.9 -2021-09-07
CVE-2021-37709 Insecure direct object reference of log files of the Import/Export feature — platform 6.5 Medium2021-08-16
CVE-2021-36278 Dell EMC PowerScale日志信息泄露漏洞 — PowerScale OneFS 8.1 High2021-08-16
CVE-2021-21601 DELL EMC Data Protection Search 日志信息泄露漏洞 — Data Protection Search 8.8 High2021-08-10
CVE-2021-21598 Dell Wyse ThinOS 日志信息泄露漏洞 — Wyse ThinOS 3.9 Low2021-08-10
CVE-2021-21597 Dell Wyse ThinOS 日志信息泄露漏洞 — Wyse ThinOS 7.2 High2021-08-10
CVE-2021-21546 DELL EMC NetWorker 日志信息泄露漏洞 — NetWorker 7.8 High2021-07-29
CVE-2021-32767 Information Disclosure in User Authentication — TYPO3.CMS 5.3 Medium2021-07-20
CVE-2021-3039 Prisma Cloud Compute: User role authorization secret for Console leaked through log file export — Prisma Cloud Compute 3.8 Low2021-06-10
CVE-2021-21558 Dell EMC NetWorker 日志信息泄露漏洞 — NetWorker 8.2 High2021-06-08
CVE-2021-3425 redhat AMQ 日志信息泄露漏洞 — broker 4.9 -2021-06-01
CVE-2021-20178 Red Hat Ansible 日志信息泄露漏洞 — Ansible 5.5 -2021-05-26
CVE-2021-20191 Red Hat Ansible 日志信息泄露漏洞 — ansible 5.5 -2021-05-26
CVE-2021-26908 Automox Agent Sensitive Log Information Disclosure — Automox Agent 3.3 Low2021-04-23
CVE-2021-3036 PAN-OS: Administrator secrets are logged in web server logs when using the PAN-OS XML API incorrectly — PAN-OS 4.4 Medium2021-04-20
CVE-2021-3447 红帽 Ansible 日志信息泄露漏洞 — ansible 5.5 -2021-04-01
CVE-2021-1442 Cisco IOS XE Software Plug-and-Play Privilege Escalation Vulnerability — Cisco IOS XE Software 7.8 -2021-03-24
CVE-2021-3034 Cortex XSOAR: Secrets for SAML single sign-on (SSO) integration may be logged in system logs — Cortex XSOAR 5.1 Medium2021-03-10
CVE-2021-21361 Sensitive information disclosure via log in com.bmuschko:gradle-vagrant-plugin — security-research 5.3 Medium2021-03-09
CVE-2020-7021 Elasticsearch 日志信息泄露漏洞 — Elasticsearch 4.9 -2021-02-10
CVE-2021-22133 GE APM 日志信息泄露漏洞 — Elastic APM Agent for Go 2.4 -2021-02-10
CVE-2021-1226 Cisco Unified Communications Products Information Disclosure Vulnerability — Cisco Emergency Responder 4.3 Medium2021-01-13
CVE-2021-3032 PAN-OS: Configuration secrets for log forwarding may be logged in system logs — PAN-OS 4.4 Medium2021-01-13
CVE-2020-26199 DELL Dell EMC Unity和UnityVSA 日志信息泄露漏洞 — Unity 6.4 Medium2021-01-05
CVE-2020-8563 Secret leaks in logs for vSphere Provider kube-controller-manager — Kubernetes 4.7 Medium2020-12-07
CVE-2020-8564 Docker config secrets leaked when file is malformed and loglevel >= 4 — Kubernetes 4.7 Medium2020-12-07
CVE-2020-8565 Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 — Kubernetes 4.7 Medium2020-12-07
CVE-2020-8566 Ceph RBD adminSecrets exposed in logs when loglevel >= 4 — Kubernetes 4.7 Medium2020-12-07

Vulnerabilities classified as CWE-532 (通过日志文件的信息暴露) represent 604 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.