Description
The product identifies an error condition and creates its own diagnostic or error messages that contain sensitive information.
Potential Impact
Confidentiality
Read Application Data
Demonstrative Examples
$uname = GetUserInput("username");
# avoid CWE-22, CWE-78, others.
if ($uname !~ /^\w+$/){ExitError("Bad hacker!") ;}
$filename = "/home/myprog/config/" . $uname . ".txt";if (!(-e $filename)){ExitError("Error: $filename does not exist");}Mitigations & Prevention
Debugging information should not make its way into a production release.
Debugging information should not make its way into a production release.
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2005-1745 | Infoleak of sensitive information in error message (physical access required). |
Related Weaknesses
Taxonomy Mappings
- PLOVER: — Product-Generated Error Message Infoleak
- Software Fault Patterns: SFP23 — Exposed Data
Frequently Asked Questions
What is CWE-210?
CWE-210 (Self-generated Error Message Containing Sensitive Information) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product identifies an error condition and creates its own diagnostic or error messages that contain sensitive information.
How can CWE-210 be exploited?
Attackers can exploit CWE-210 (Self-generated Error Message Containing Sensitive Information) to read application data. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-210?
Key mitigations include: Debugging information should not make its way into a production release.
What is the severity of CWE-210?
CWE-210 is classified as a Base-level weakness (Medium abstraction). It has been observed in 1 real-world CVEs.