This vulnerability occurs when a process is started with sensitive data, such as passwords or API keys, passed directly in its command-line arguments or environment variables. Because this information is often visible to other processes on the system, it can be easily exposed.
On most operating systems, other users can list running processes and view details like command-line arguments and environment variables. If your application launches a subprocess using visible sensitive information, any user with basic system privileges could potentially see those credentials, creating a significant information leak. This exposure allows attackers to directly harvest secrets or understand your application's internal configuration, which can be the first step in a broader attack. To prevent this, sensitive data should never be passed via these visible channels; instead, use more secure methods like pipes, protected files, or inter-process communication (IPC) mechanisms designed to handle secrets.
Impact: Read Application Data
java