An information exposure may occur if any of the following apply:
| Impact | Details |
|---|---|
|
Read Application Data |
Scope: Confidentiality
The attacker may find sensitive information located in the WSDL file.
|
| Phase(s) | Mitigation |
|---|---|
|
Architecture and Design |
Limit access to the WSDL file as much as possible. If services are provided only to a limited number of entities, it may be better to provide WSDL privately to each of these entities than to publish WSDL publicly.
|
|
Architecture and Design |
Strategy: Separation of Privilege Make sure that WSDL does not describe methods that should not be publicly accessible. Make sure to protect service methods that should not be publicly accessible with access controls.
|
|
Architecture and Design |
Do not use method names in WSDL that might help an adversary guess names of private methods/resources used by the service.
|
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Base Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. | 538 | Insertion of Sensitive Information into Externally-Accessible File or Directory |
| Phase | Note |
|---|---|
| Implementation | |
| Operation |
Class: Not Language-Specific (Undetermined Prevalence)
Web Server (Often Prevalent)
Example 1
The WSDL for a service providing information on the best price of a certain item exposes the following method: float getBestPrice(String ItemID) An attacker might guess that there is a method setBestPrice (String ItemID, float Price) that is available and invoke that method to try and change the best price of a given item to their advantage. The attack may succeed if the attacker correctly guesses the name of the method, the method does not have proper access controls around it and the service itself has the functionality to update the best price of the item.
| Nature | Type | ID | Name |
|---|---|---|---|
| MemberOf | CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. | 966 | SFP Secondary Cluster: Other Exposures |
| MemberOf | CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. | 1345 | OWASP Top Ten 2021 Category A01:2021 - Broken Access Control |
| MemberOf | CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. | 1417 | Comprehensive Categorization: Sensitive Information Exposure |
Rationale
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.Comments
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.| Submissions | |||
|---|---|---|---|
| Submission Date | Submitter | Organization | |
|
2008年01月30日
(CWE Draft 8, 2008年01月30日) |
Evgeny Lebanidze | Cigital | |
| Modifications | |||
| Modification Date | Modifier | Organization | |
| 2023年06月29日 | CWE Content Team | MITRE | |
| updated Mapping_Notes | |||
| 2023年04月27日 | CWE Content Team | MITRE | |
| updated Relationships, Time_of_Introduction | |||
| 2021年10月28日 | CWE Content Team | MITRE | |
| updated Relationships | |||
| 2020年02月24日 | CWE Content Team | MITRE | |
| updated Name, Relationships | |||
| 2017年11月08日 | CWE Content Team | MITRE | |
| updated Applicable_Platforms, Demonstrative_Examples, Description, Enabling_Factors_for_Exploitation, Observed_Examples | |||
| 2014年07月30日 | CWE Content Team | MITRE | |
| updated Relationships | |||
| 2013年02月21日 | CWE Content Team | MITRE | |
| updated Potential_Mitigations | |||
| 2012年05月11日 | CWE Content Team | MITRE | |
| updated Relationships | |||
| 2011年06月01日 | CWE Content Team | MITRE | |
| updated Common_Consequences | |||
| 2010年12月13日 | CWE Content Team | MITRE | |
| updated Common_Consequences | |||
| 2010年09月27日 | CWE Content Team | MITRE | |
| updated Description, Name | |||
| 2009年10月29日 | CWE Content Team | MITRE | |
| updated Common_Consequences | |||
| 2008年09月08日 | CWE Content Team | MITRE | |
| updated Applicable_Platforms, Common_Consequences, Description, Relationships | |||
| Previous Entry Names | |||
| Change Date | Previous Entry Name | ||
| 2010年09月27日 | Information Leak through WSDL File | ||
| 2020年02月24日 | Information Exposure Through WSDL File | ||
Use of the Common Weakness Enumeration (CWE™) and the associated references from this website are subject to the Terms of Use. CWE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and managed by the Homeland Security Systems Engineering and Development Institute (HSSEDI) which is operated by The MITRE Corporation (MITRE). Copyright © 2006–2025, The MITRE Corporation. CWE, CWSS, CWRAF, and the CWE logo are trademarks of The MITRE Corporation.