Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-532 (通过日志文件的信息暴露) — Vulnerability Class 604

604 vulnerabilities classified as CWE-532 (通过日志文件的信息暴露). AI Chinese analysis included.

CWE-532 represents a critical information disclosure weakness where software inadvertently records sensitive data, such as passwords, credit card numbers, or personal identifiers, into log files. This vulnerability is typically exploited by attackers who gain access to these logs through insufficient file permissions, insecure storage practices, or compromised administrative accounts. Once accessed, the exposed data can be harvested for identity theft, financial fraud, or further system intrusion. To prevent this, developers must implement strict data sanitization protocols, ensuring that sensitive fields are masked or excluded before logging. Additionally, employing robust access controls and encryption for log storage, alongside regular audits of logging configurations, helps mitigate the risk of accidental exposure. By treating log files as potential repositories of confidential information, organizations can significantly reduce their attack surface and maintain compliance with data protection standards.

MITRE CWE Description
The product writes sensitive information to a log file.
Common Consequences (1)
ConfidentialityRead Application Data
Logging sensitive user data, full path names, or system information often provides attackers with an additional, less-protected path to acquiring the information.
Mitigations (4)
Architecture and Design, ImplementationConsider seriously the sensitivity of the information written into log files. Do not write secrets into the log files.
DistributionRemove debug log files before deploying the application into production.
OperationProtect log files against unauthorized read/write.
ImplementationAdjust configurations appropriately when software is transitioned from a debug state to production.
Examples (2)
In the following code snippet, a user's full name and credit card number are written to a log file.
logger.info("Username: " + usernme + ", CCN: " + ccn);
Bad · Java
This code stores location information about the current user:
locationClient = new LocationClient(this, this, this); locationClient.connect(); currentUser.setLocation(locationClient.getLastLocation()); ... catch (Exception e) { AlertDialog.Builder builder = new AlertDialog.Builder(this); builder.setMessage("Sorry, this application has experienced an error."); AlertDialog alert = builder.create(); alert.show(); Log.e("ExampleActivity", "Caught exception: " + e + " While on User:" + User.toString()); }
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2019-11290 Cloud Foundry UAA logs query parameters in tomcat access file — UAA Release 7.5 -2019-11-25
CVE-2019-11283 Password leak in smbdriver logs — SMB Volume 8.8 -2019-10-23
CVE-2019-10212 Red Hat Undertow 日志信息泄露漏洞 — undertow 9.8 -2019-10-02
CVE-2019-3763 Dell RSA Identity Governance and Lifecycle和RSA Via Lifecycle and Governance 日志信息泄露漏洞 — RSA Identity Governance and Lifecycle 8.8 High2019-09-11
CVE-2019-11250 Kubernetes client-go logs authorization headers at debug verbosity levels — Kubernetes 6.5 -2019-08-29
CVE-2019-5634 Hickory Smart Lock Insecure Logging on Android — Hickory Smart 4.3 -2019-08-22
CVE-2019-13515 OSIsoft PI Web API 日志信息泄露漏洞 — OSIsoft PI Web API 6.5 -2019-08-15
CVE-2019-1961 Cisco Enterprise NFV Infrastructure Software Web Portal Arbitrary File Read Vulnerability — Cisco Enterprise NFV Infrastructure Software 4.9 -2019-08-08
CVE-2019-1953 Cisco Enterprise NFV Infrastructure Software Password Recovery Vulnerability — Cisco Enterprise NFV Infrastructure Software 6.5 -2019-08-08
CVE-2019-10165 Red Hat OpenShift Container Platform 日志信息泄露漏洞 — openshift 7.1 -2019-07-30
CVE-2019-11273 PKS Telemetry logs credentials — Pivotal Container Service (PKS) 4.3 -2019-07-23
CVE-2019-10194 oVirt Metrics 日志信息泄露漏洞 — ovirt-engine-metrics 5.5 -2019-07-11
CVE-2019-11271 Bosh Deployment logs leak sensitive information — BOSH 7.1 -2019-06-18
CVE-2019-3888 Red Hat Undertow 日志信息泄露漏洞 — undertow 9.8 -2019-06-12
CVE-2019-3891 Red Hat Satellite Candlepin组件日志信息泄露漏洞 — candlepin 7.8 -2019-04-12
CVE-2019-3830 OpenStack Octavia 日志信息泄露漏洞 — openstack-ceilometer 5.5 -2019-03-26
CVE-2018-16856 Red Hat OpenStack Platform 日志信息泄露漏洞 — openstack-octavia 6.2 -2019-03-26
CVE-2018-19014 多款Drager产品安全漏洞 — Dräger Infinity Delta 6.5 -2019-01-28
CVE-2018-16889 debug 日志信息泄露漏洞 — ceph 7.5 -2019-01-28
CVE-2019-0004 Juniper ATP: API and device keys are logged in a world-readable permissions file — Juniper ATP 5.5 -2019-01-15
CVE-2019-0021 Juniper ATP: secret CLI inputs are logged to /var/log/syslog in clear text — Juniper ATP 5.5 -2019-01-15
CVE-2018-16859 Ansible Playbooks 信息泄露漏洞 — ansible 6.0 -2018-11-29
CVE-2018-3827 Elasticsearch repository-azure插件信任管理问题漏洞 — Elasticsearch 8.1 -2018-09-19
CVE-2018-3828 Elastic Cloud Enterprise 信息泄露漏洞 — Elastic Cloud Enterprise 8.8 -2018-09-19
CVE-2018-10889 Moodle 信息泄露漏洞 — moodle 5.3 -2018-07-10
CVE-2018-10855 Ansible 安全漏洞 — ansible 5.3 -2018-07-02
CVE-2018-1072 Red Hat oVirt ovirt-engine 信息泄露漏洞 — ovirt-engine-setup 7.1 -2018-06-26
CVE-2018-1117 Red Hat oVirt Ansible Roles 权限许可和访问控制漏洞 — ovirt-ansible-roles 7.5 -2018-06-19
CVE-2018-1075 ovirt-engine 日志信息泄露漏洞 — ovirt-engine 8.4 -2018-06-12
CVE-2018-1241 Dell EMC RecoverPoint和RecoverPoint for Virtual Machines 安全漏洞 — Dell EMC RecoverPoint 8.8 -2018-05-29

Vulnerabilities classified as CWE-532 (通过日志文件的信息暴露) represent 604 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.