...
Wiki Markup |
---|
This guideline extends equally to server side applications as well as clients. Adversaries can glean sensitive information from not only vulnerable web servers but also from innocent users who use vulnerable web browsers. In 2004, Schoenefeld discovered an instance in the Opera v7.54 web browser, wherein an attacker could use the {{sun.security.krb5.Credentials}} class in an applet as an oracle to "retrieve the name of the currently logged in user and parse his home directory from the information which is provided by the thrown {{java.security.AccessControlException}}." \[[Schoenefeld 2004|AA. Java References#SchoenefeldBibliography#Schoenefeld 04]\]. |
All Errors reveal information by which an attacker can carry out a denial of service against the system. The table shown below lists a few sensitive errors and exceptions:
...
Wiki Markup |
---|
\[[SCG 2007|AA. Java References#SCGBibliography#SCG 07]\] Guideline 3-4 Purge sensitive information from exceptions \[[Gong 2003|AA. Java References#GongBibliography#Gong 03]\] 9.1 Security Exceptions \[[MITRE 2009|AA. Java References#MITREBibliography#MITRE 09]\] [CWE ID 209|http://cwe.mitre.org/data/definitions/209.html] "Error Message Information Leak", [CWE ID 600|http://cwe.mitre.org/data/definitions/600.html] "Failure to Catch All Exceptions (Missing Catch Block)", [CWE ID 497|http://cwe.mitre.org/data/definitions/497.html] "Information Leak of System Data" |
...