CWE - CWE-13

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Common Weakness Enumeration

A community-developed list of SW & HW weaknesses that


can become vulnerabilities

Home About ▼ CWE List ▼ Mapping ▼ Top-N Lists ▼ Community ▼ News ▼ Search

CWE-13: ASP.NET Misconfiguration: Password in Configuration File


Weakness ID: 13
Vulnerability Mapping: ALLOWED
Abstraction: Variant

Mapping
View customized information: Conceptual Operational Complete Custom
Friendly

Description
Storing a plaintext password in a configuration file allows anyone who can read the file access to the password-protected
resource making them an easy target for attackers.
Relationships
Relevant to the view "Research Concepts" (CWE-1000)
Nature Type ID Name
ChildOf 260 Password in Configuration File

Memberships

Nature Type ID Name


MemberOf 2 7PK - Environment
MemberOf 731 OWASP Top Ten 2004 Category A10 - Insecure Configuration Management
MemberOf 963 SFP Secondary Cluster: Exposed Data
MemberOf 1349 OWASP Top Ten 2021 Category A05:2021 - Security Misconfiguration
MemberOf 1396 Comprehensive Categorization: Access Control

Vulnerability Mapping Notes

Usage: ALLOWED (this CWE ID could be used to map to real-world vulnerabilities)

Reason: Acceptable-Use

Rationale:

This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root
causes of vulnerabilities.
Comments:

Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a
mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

Taxonomy Mappings

Mapped Taxonomy Name Node ID Fit Mapped Node Name


7 Pernicious Kingdoms ASP.NET Misconfiguration: Password in Configuration File

Content History

Submissions
Submission Date Submitter Organization
2006-07-19 7 Pernicious Kingdoms
(CWE Draft 3, 2006-07-19)
Modifications

You might also like