Improper Error Handling vulnerability disclosure

 

Improper Error Handling

Severity: Medium

Vulnerability description

Improper handling of errors can introduce a variety of security problems for a web site. The most common problem is when detailed internal error messages such as stack traces, database dumps, and error codes are displayed to the user (hacker). These messages reveal implementation details that should never be revealed. Such details can provide hackers important clues on potential flaws in the site and such messages are also disturbing to normal users.

Impact

Often this will either reveal sensitive information which may be used for a later attack or private information stored in the server.

Attack simulation

 If any website has generate error on page which disclose the sensitive information. 

Recommendation

Ensure that error messages only contain minimal details that are useful to the intended audience, and nobody else. The messages need to strike the balance between being too cryptic and not being cryptic enough. They should not necessarily reveal the methods that were used to determine the error. Such detailed information can be used to refine the original attack to increase the chances of success.

If errors must be tracked in some detail, capture them in log messages - but consider what could occur if the log messages can be viewed by attackers. Avoid recording highly sensitive information such as passwords in any form. Avoid inconsistent messaging that might accidentally tip off an attacker about internal state, such as whether a username is valid or not.

Affected URLs/parameters

Comments

  1. No Deposit Casinos | DrmCD
    Casino players should be familiar with the No 세종특별자치 출장마사지 Deposit 공주 출장마사지 Casinos list and that the 전주 출장마사지 gambling website should keep updated with all new 의왕 출장마사지 and exciting offers every  강원도 출장샵 Rating: 2.7 · ‎1,994 reviews

    ReplyDelete

Post a Comment

Popular posts from this blog

Set password by default when transfering data through xender hot spot network.

Browser cache weakness

Email Phishing