OWASP Top Ten 2017 Category A3 - Sensitive Data Exposure

A category in the Common Weakness Enumeration published by The MITRE Corporation.


Summary

Categories in the Common Weakness Enumeration (CWE) group entries based on some common characteristic or attribute.

Weaknesses in this category are related to the A3 category in the OWASP Top Ten 2017.

Weaknesses

Cleartext Storage of Sensitive Information

The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere.

Cleartext Transmission of Sensitive Information

The software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

Exposure of Private Personal Information to an Unauthorized Actor

The product does not properly prevent a person's private, personal information from being accessed by actors who either (1) are not explicitly authorized to access the...

Improper Certificate Validation

The software does not validate, or incorrectly validates, a certificate.

Inadequate Encryption Strength

The software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

Missing Cryptographic Step

The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.

Missing Encryption of Sensitive Data

The software does not encrypt sensitive or critical information before storage or transmission.

Reversible One-Way Hash

The product uses a hashing algorithm that produces a hash value that can be used to determine the original input, or to find an input that can produce the same hash, m...

Storage of File With Sensitive Data Under FTP Root

The application stores sensitive data under the FTP server root with insufficient access control, which might make it accessible to untrusted parties.

Use of a Broken or Risky Cryptographic Algorithm

The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.

Categories

Deprecated or Obsolete

Key Management Errors

Weaknesses in this category are related to errors in the management of cryptographic keys.

Concepts

Weaknesses in OWASP Top Ten (2017)

CWE nodes in this view (graph) are associated with the OWASP Top Ten, as released in 2017.

See Also

  1. Top 10 2017

Common Weakness Enumeration content on this website is copyright of The MITRE Corporation unless otherwise specified. Use of the Common Weakness Enumeration and the associated references on this website are subject to the Terms of Use as specified by The MITRE Corporation.