结构: Simple
Abstraction: Variant
状态: Draft
被利用可能性: unkown
The application stores sensitive information in cleartext in an executable.
Attackers can reverse engineer binary code to obtain secret data. This is especially easy when the cleartext is plain ASCII. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
cwe_Nature: ChildOf cwe_CWE_ID: 312 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 312 cwe_View_ID: 699 cwe_Ordinal: Primary
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
Confidentiality | Read Application Data |
标识 | 说明 | 链接 |
---|---|---|
CVE-2005-1794 | Product stores RSA private key in a DLL and uses it to sign a certificate, allowing spoofing of servers and MITM attacks. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1794 |
CVE-2001-1527 | administration passwords in cleartext in executable | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1527 |
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Plaintext Storage in Executable |