CWE-214: Information Exposure Through Process Environment
Information Exposure Through Process Environment
Weakness ID: 214 (Weakness Variant)
A process is invoked with sensitive arguments, environment variables, or other elements that can be seen by other processes on the operating system.
Many operating systems allow a user to list information about processes that are owned by other users. This information could include command line arguments or environment variable settings. When this data contains sensitive information such as credentials, it might allow other users to launch an attack against the software or related resources.
Time of Introduction
Architecture and Design
Technical Impact: Read application
In the Java example below, the password for a keystore file is read
from a system property. If the property is defined on the command line when
the program is invoked (using the -D... syntax), the password may be
displayed in the OS process list.