CWE-555: J2EE Misconfiguration: Plaintext Password in Configuration File

Description

The J2EE application stores a plaintext password in a configuration file.

Submission Date :

July 19, 2006, midnight

Modification Date :

2023-06-29 00:00:00+00:00

Organization :

MITRE
Extended Description

Storing a plaintext password in a configuration file allows anyone who can read the file to access the password-protected resource, making it an easy target for attackers.

Example Vulnerable Codes

Example - 1

Below is a snippet from a Java properties file in which the LDAP server password is stored in plaintext.


webapp.ldap.username=secretUsernamewebapp.ldap.password=secretPassword

Related Weaknesses

This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined to give an overview of the different insight to similar items that may exist at higher and lower levels of abstraction.

Visit http://cwe.mitre.org/ for more details.

© cvefeed.io
Latest DB Update: Dec. 26, 2024 1:14