Truncation of Security-relevant Information

Draft Base
Structure: Simple
Description

This vulnerability occurs when a system shortens or cuts off security-critical data during display, logging, or processing. This truncation can hide the true details of an attack, making it harder to detect, investigate, and respond to threats.

Extended Description

Truncation of security-relevant information often happens in log files, error messages, user interfaces, or data pipelines with fixed-length buffers. For example, an application might log only the first 100 characters of a maliciously long input, discarding the payload that reveals the attack vector. Similarly, a user interface might display a truncated file path or URL, obscuring the malicious directory or parameters. This creates blind spots for security teams and automated monitoring tools. To prevent this, developers should ensure logging mechanisms and data handlers can accommodate the full expected length of security events. Use data structures that don't impose arbitrary limits, or implement safe truncation that preserves the most critical attack indicators. Always validate that audit trails contain complete, unaltered evidence, as this data is essential for effective incident response and forensic analysis.

Common Consequences 1
Scope: Non-Repudiation

Impact: Hide Activities

The source of an attack will be difficult or impossible to determine. This can allow attacks to the system to continue without notice.

Observed Examples 3
CVE-2005-0585Web browser truncates long sub-domains or paths, facilitating phishing.
CVE-2004-2032Bypass URL filter via a long URL with a large number of trailing hex-encoded space characters.
CVE-2003-0412application server does not log complete URI of a long request (truncation).
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Modes of Introduction
Implementation
Operation
Related Weaknesses
Taxonomy Mapping
  • PLOVER