Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-214:Invocation of Process Using Visible Sensitive Information
Weakness ID:214
Version:v4.17
Weakness Name:Invocation of Process Using Visible Sensitive Information
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

A process is invoked with sensitive command-line arguments, environment variables, or other elements that can be seen by other processes on the operating system.

▼Extended Description

Many operating systems allow a user to list information about processes that are owned by other users. Other users could see information such as command line arguments or environment variable settings. When this data contains sensitive information such as credentials, it might allow other users to launch an attack against the product or related resources.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfAllowedB497Exposure of Sensitive System Information to an Unauthorized Control Sphere
ParentOfAllowedV526Cleartext Storage of Sensitive Information in an Environment Variable
Nature: ChildOf
Mapping: Allowed
Type: Base
ID: 497
Name: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 526
Name: Cleartext Storage of Sensitive Information in an Environment Variable
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC199Information Management Errors
MemberOfProhibitedC963SFP Secondary Cluster: Exposed Data
MemberOfProhibitedC1016Limit Exposure
MemberOfProhibitedC1417Comprehensive Categorization: Sensitive Information Exposure
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 199
Name: Information Management Errors
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 963
Name: SFP Secondary Cluster: Exposed Data
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1016
Name: Limit Exposure
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1417
Name: Comprehensive Categorization: Sensitive Information Exposure
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-294Not Language-Specific Weaknesses
MemberOfProhibitedBSBOSS-328Read Application Data (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-294
Name: Not Language-Specific Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-328
Name: Read Application Data (impact)
▼Relevant To View
Relevant to the view"Architectural Concepts - (1008)"
NatureMappingTypeIDName
MemberOfProhibitedC1016Limit Exposure
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1016
Name: Limit Exposure
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC199Information Management Errors
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 199
Name: Information Management Errors
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC963SFP Secondary Cluster: Exposed Data
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 963
Name: SFP Secondary Cluster: Exposed Data
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
ConfidentialityN/ARead Application Data
N/A
Scope: Confidentiality
Likelihood: N/A
Impact: Read Application Data
Note:
N/A
▼Potential Mitigations
▼Modes Of Introduction
Phase: Architecture and Design
Note:

N/A

Phase: Implementation
Note:

REALIZATION: This weakness is caused during implementation of an architectural security tactic.

Phase: Operation
Note:

N/A

▼Applicable Platforms
Languages
Class: Not Language-Specific(Undetermined Prevalence)
▼Demonstrative Examples
Example 1

In the example below, the password for a keystore file is read from a system property.

Language: ( code)
N/A

Language: Java(Bad code)
String keystorePass = System.getProperty("javax.net.ssl.keyStorePassword"); if (keystorePass == null) { System.err.println("ERROR: Keystore password not specified."); System.exit(-1); } ...

Language: ( code)
N/A

If the property is defined on the command line when the program is invoked (using the -D... syntax), the password may be displayed in the OS process list.

▼Observed Examples
ReferenceDescription
CVE-2005-1387
password passed on command line
CVE-2005-2291
password passed on command line
CVE-2001-1565
username/password on command line allows local users to view via "ps" or other process listing programs
CVE-2004-1948
Username/password on command line allows local users to view via "ps" or other process listing programs.
CVE-1999-1270
PGP passphrase provided as command line argument.
CVE-2004-1058
Kernel race condition allows reading of environment variables of a process that is still spawning.
CVE-2021-32638
Code analysis product passes access tokens as a command-line parameter or through an environment variable, making them visible to other processes via the ps command.
Reference: CVE-2005-1387
Description:
password passed on command line
Reference: CVE-2005-2291
Description:
password passed on command line
Reference: CVE-2001-1565
Description:
username/password on command line allows local users to view via "ps" or other process listing programs
Reference: CVE-2004-1948
Description:
Username/password on command line allows local users to view via "ps" or other process listing programs.
Reference: CVE-1999-1270
Description:
PGP passphrase provided as command line argument.
Reference: CVE-2004-1058
Description:
Kernel race condition allows reading of environment variables of a process that is still spawning.
Reference: CVE-2021-32638
Description:
Code analysis product passes access tokens as a command-line parameter or through an environment variable, making them visible to other processes via the ps command.
▼Affected Resources
  • System Process
▼Functional Areas
    ▼Weakness Ordinalities
    OrdinalityDescription
    ▼Detection Methods
    ▼Vulnerability Mapping Notes
    Usage:Allowed
    Reason:Acceptable-Use
    Rationale:

    This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

    Comments:

    Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

    Suggestions:
    ▼Notes
    Research Gap

    Under-studied, especially environment variables.

    N/A

    ▼Taxonomy Mappings
    Taxonomy NameEntry IDFitEntry Name
    PLOVERN/AN/AProcess information infoleak to other processes
    Software Fault PatternsSFP23N/AExposed Data
    Taxonomy Name: PLOVER
    Entry ID: N/A
    Fit: N/A
    Entry Name: Process information infoleak to other processes
    Taxonomy Name: Software Fault Patterns
    Entry ID: SFP23
    Fit: N/A
    Entry Name: Exposed Data
    ▼Related Attack Patterns
    IDName
    ▼References
    Details not found