CWE-214: Information Exposure Through Process Environment
Information Exposure Through Process Environment
Weakness ID: 214 (Weakness Variant)
A process is invoked with sensitive arguments, environment variables, or other elements that can be seen by other processes on the operating system.
Many operating systems allow a user to list information about processes that are owned by other users. This information could include command line arguments or environment variable settings. When this data contains sensitive information such as credentials, it might allow other users to launch an attack against the software or related resources.
Time of Introduction
Architecture and Design
Technical Impact: Read application data
In the example below, the password for a keystore file is read from
a system property.