The product does not encrypt sensitive or critical information before storage or transmission.
N/A
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2009-2272
password and username stored in cleartext in a cookie
CVE: CVE-2009-1466
password stored in cleartext in a file with insecure permissions
CVE: CVE-2009-0152
chat program disables SSL in some circumstances even when the user says to use SSL.
CVE: CVE-2009-1603
Chain: product uses an incorrect public exponent when generating an RSA key, which effectively disables the encryption
CVE: CVE-2009-0964
storage of unencrypted passwords in a database
CVE: CVE-2008-6157
storage of unencrypted passwords in a database
CVE: CVE-2008-6828
product stores a password in cleartext in memory
CVE: CVE-2008-1567
storage of a secret key in cleartext in a temporary file
CVE: CVE-2008-0174
SCADA product uses HTTP Basic Authentication, which is not encrypted
CVE: CVE-2007-5778
login credentials stored unencrypted in a registry key
CVE: CVE-2002-1949
Passwords transmitted in cleartext.
CVE: CVE-2008-4122
Chain: Use of HTTPS cookie without "secure" flag causes it to be transmitted across unencrypted HTTP.
CVE: CVE-2008-3289
Product sends password hash in cleartext in violation of intended policy.
CVE: CVE-2008-4390
Remote management feature sends sensitive information including passwords in cleartext.
CVE: CVE-2007-5626
Backup routine sends password in cleartext in email.
CVE: CVE-2004-1852
Product transmits Blowfish encryption key in cleartext.
CVE: CVE-2008-0374
Printer sends configuration information, including administrative password, in cleartext.
CVE: CVE-2007-4961
Chain: cleartext transmission of the MD5 hash of password enables attacks against a server that is susceptible to replay (CWE-294).
CVE: CVE-2007-4786
Product sends passwords in cleartext to a log server.
CVE: CVE-2005-3140
Product sends file with cleartext passwords in e-mail message intended for diagnostic purposes.
Phase | Note |
---|---|
Architecture and Design | OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase. |
Operation | N/A |
Intro: This code writes a user's login information to a cookie so the user does not have to login again later.
Body: The code stores the user's username and password in plaintext in a cookie on the user's machine. This exposes the user's login information if their computer is compromised by an attacker. Even if the user's machine is not compromised, this weakness combined with cross-site scripting (CWE-79) could allow an attacker to remotely copy the cookie.
function persistLogin($username, $password){ $data = array("username" => $username, "password"=> $password); setcookie ("userdata", $data); }
Intro: The following code attempts to establish a connection, read in a password, then store it to a buffer.
Body: While successful, the program does not encrypt the data before writing it to a buffer, possibly exposing it to unauthorized actors.
server.sin_family = AF_INET; hp = gethostbyname(argv[1]); if (hp==NULL) error("Unknown host"); memcpy( (char *)&server.sin_addr,(char *)hp->h_addr,hp->h_length); if (argc < 3) port = 80; else port = (unsigned short)atoi(argv[3]); server.sin_port = htons(port); if (connect(sock, (struct sockaddr *)&server, sizeof server) < 0) error("Connecting"); ... while ((n=read(sock,buffer,BUFSIZE-1))!=-1) { write(dfd,password_buffer,n); ...
Intro: The following code attempts to establish a connection to a site to communicate sensitive information.
Body: Though a connection is successfully made, the connection is unencrypted and it is possible that all sensitive data sent to or received from the server will be read by unintended actors.
try { URL u = new URL("http://www.secret.example.org/"); HttpURLConnection hu = (HttpURLConnection) u.openConnection(); hu.setRequestMethod("PUT"); hu.connect(); OutputStream os = hu.getOutputStream(); hu.disconnect(); } catch (IOException e) { //... }