Description
The product does not record or display information that would be important for identifying the source or nature of an attack, or determining if an action is safe.
Potential Impact
Non-Repudiation
Hide Activities
Demonstrative Examples
function login($userName,$password){
if(authenticate($userName,$password)){return True;}else{incrementLoginAttempts($userName);if(recentLoginAttempts($userName) > 5){writeLog("Failed login attempt by User: " . $userName . " at " + date('r') );}}
}function readFile($filename){
$user = getCurrentUser();$realFile = $filename;
//resolve file if its a symbolic link
if(is_link($filename)){$realFile = readlink($filename);}
if(fileowner($realFile) == $user){echo file_get_contents($realFile);return;}else{echo 'Access denied';writeLog($user . ' attempted to access the file '. $filename . ' on '. date('r'));}
}Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-1999-1029 | Login attempts are not recorded if the user disconnects before the maximum number of tries. |
| CVE-2002-1839 | Sender's IP address not recorded in outgoing e-mail. |
| CVE-2000-0542 | Failed authentication attempts are not recorded if later attempt succeeds. |
Related Weaknesses
Taxonomy Mappings
- PLOVER: — Omission of Security-relevant Information
Frequently Asked Questions
What is CWE-223?
CWE-223 (Omission of Security-relevant Information) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product does not record or display information that would be important for identifying the source or nature of an attack, or determining if an action is safe.
How can CWE-223 be exploited?
Attackers can exploit CWE-223 (Omission of Security-relevant Information) to hide activities. This weakness is typically introduced during the Architecture and Design, Implementation, Operation phase of software development.
How do I prevent CWE-223?
Follow secure coding practices, conduct code reviews, and use automated security testing tools (SAST/DAST) to detect this weakness early in the development lifecycle.
What is the severity of CWE-223?
CWE-223 is classified as a Base-level weakness (Medium abstraction). It has been observed in 3 real-world CVEs.