CWE-555: J2EE Misconfiguration: Plaintext Password in Configuration File

Export to Word

Description

The J2EE application stores a plaintext password in a configuration file.

Extended Description

Storing a plaintext password in a configuration file allows anyone who can read the file to access the password-protected resource, making it an easy target for attackers.


ThreatScore

Threat Mapped score: 3.25

Industry: Finiancial

Threat priority: P2 - Serious (High)


Observed Examples (CVEs)

Related Attack Patterns (CAPEC)

N/A


Attack TTPs

N/A

Modes of Introduction

Phase Note
Architecture and Design N/A
Implementation N/A

Common Consequences

Potential Mitigations

Applicable Platforms


Demonstrative Examples

Intro: Below is a snippet from a Java properties file in which the LDAP server password is stored in plaintext.

webapp.ldap.username=secretUsername webapp.ldap.password=secretPassword

Notes

← Back to CWE list