Description
The product stores sensitive data under the web document root with insufficient access control, which might make it accessible to untrusted parties.
Besides public-facing web pages and code, products may store sensitive data, code that is not directly invoked, or other files under the web document root of the web server. If the server is not configured or otherwise used to prevent direct access to those files, then attackers may obtain this sensitive data.
Potential Impact
Confidentiality
Read Application Data
Mitigations & Prevention
Avoid storing information under the web root directory.
Access control permissions should be set to prevent reading/writing of sensitive files inside/outside of the web directory.
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2005-1835 | Data file under web root. |
| CVE-2005-2217 | Data file under web root. |
| CVE-2002-1449 | Username/password in data file under web root. |
| CVE-2002-0943 | Database file under web root. |
| CVE-2005-1645 | database file under web root. |
Related Weaknesses
Taxonomy Mappings
- PLOVER: — Sensitive Data Under Web Root
- OWASP Top Ten 2004: A10 — Insecure Configuration Management
Frequently Asked Questions
What is CWE-219?
CWE-219 (Storage of File with Sensitive Data Under Web Root) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Variant-level weakness. The product stores sensitive data under the web document root with insufficient access control, which might make it accessible to untrusted parties.
How can CWE-219 be exploited?
Attackers can exploit CWE-219 (Storage of File with Sensitive Data Under Web Root) to read application data. This weakness is typically introduced during the Operation, Implementation phase of software development.
How do I prevent CWE-219?
Key mitigations include: Avoid storing information under the web root directory.
What is the severity of CWE-219?
CWE-219 is classified as a Variant-level weakness (Low-Medium abstraction). It has been observed in 5 real-world CVEs.