While adding general comments is very useful, some programmers tend to leave important data, such as: filenames related to the web application, old links or links which were not meant to be browsed by users, old code fragments, etc.
An attacker who finds these comments can map the application's structure and files, expose hidden parts of the site, and study the fragments of code to reverse engineer the application, which may help develop further attacks against the site.
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2007-6197
Version numbers and internal hostnames leaked in HTML comments.
CVE: CVE-2007-4072
CMS places full pathname of server in HTML comment.
CVE: CVE-2009-2431
blog software leaks real username in HTML comment.
N/A
N/A
Phase | Note |
---|---|
Implementation | N/A |
Intro: The following comment, embedded in a JSP, will be displayed in the resulting HTML output.
<!-- FIXME: calling this with more than 30 args kills the JDBC server -->