Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: reverted severity

Hard coding sensitive information, such as passwords, server IP addresses, and encryption keys can expose the information to attackers. Anyone who has access to the class files can decompile them and discover the sensitive information. ConsequentlyLeaking data protected by ITAR or HIPAA can also have legal consequences. Consequently, programs must not hard code sensitive information.

...

Hard coding sensitive information exposes that information to attackers. Often, this information is sufficient for an attacker to obtain privilege escalation, and so the severity is high.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

MSC03-J

MediumHigh

Probable

Medium

P8P12

L2L1

Automated Detection

ToolVersionCheckerDescription
Coverity7.5

HARDCODED_CREDENTIALS

CONFIG

FB.DMI_CONSTANT_DB_ PASSWORD

FB.DMI_EMPTY_DB_PASSWORD

Implemented
Fortify1.0

Password_Management

Password_Management__Hardcoded_Password

Partially Implemented
PMD1.0AvoidUsingHardCodedIPPartially Implemented

...