Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

While this exception is less likely to leak useful information than previous noncompliant code examples, it still reveals that the specified file cannot be read. More specifically, the program reacts differently to nonexistent file paths than it does to valid ones, and an attacker can still infer sensitive information about the file system from this program's behavior. Failure to restrict user input leaves the system vulnerable to a brute force attack in which the attacker discovers valid file names by issuing queries that collectively cover the space of possible file names. Filenames File names that cause the program to return the sanitized exception indicate nonexistent files, filenames file names that don't, reveal existing files.

...

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="706dc4c520105556-9708ca81-4fec48f7-996c939b-d46ef74d19cdfac7571e82ac"><ac:plain-text-body><![CDATA[

[[Gong 2003

AA. Bibliography#Gong 03]]

9.1 Security Exceptions

]]></ac:plain-text-body></ac:structured-macro>

...