Password in Configuration File

Incomplete Base
Structure: Simple
Description

This vulnerability occurs when an application stores sensitive passwords directly within a configuration file, making them easily readable to anyone with access to that file.

Extended Description

Storing passwords in plain text within config files, such as .env, .properties, XML, or YAML files, is a critical security misstep. These files are often committed to version control, deployed with the application, or left in accessible directories, exposing the credentials to developers, system administrators, or even attackers who gain basic access to the system. The core problem is that configuration files are designed for settings, not for safeguarding secrets. An attacker who discovers this file can immediately steal the password to impersonate the application, often gaining the same level of access to databases, external APIs, or administrative systems. In some cases, if the file has write permissions, they could even change the password to one they control, locking out the legitimate application and taking full control of the dependent service. This single flaw can lead to complete system compromise, data breaches, and unauthorized actions performed under the application's identity.

Common Consequences 1
Scope: Access Control

Impact: Gain Privileges or Assume Identity

Detection Methods 1
Automated Static AnalysisHigh
Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)
Potential Mitigations 2
Phase: Architecture and Design
Avoid storing passwords in easily accessible locations.
Phase: Architecture and Design
Consider storing cryptographic hashes of passwords as an alternative to storing in plaintext.
Demonstrative Examples 2
Below is a snippet from a Java properties file.

Code Example:

Bad
Java
java
Because the LDAP credentials are stored in plaintext, anyone with access to the file can gain access to the resource.

ID : DX-43

The following examples show a portion of properties and configuration files for Java and ASP.NET applications. The files include username and password information but they are stored in cleartext.
This Java example shows a properties file with a cleartext username / password pair.

Code Example:

Bad
Java

Java Web App ResourceBundle properties file*

java
The following example shows a portion of a configuration file for an ASP.Net application. This configuration file includes username and password information for a connection to a database but the pair is stored in cleartext.

Code Example:

Bad
ASP.NET
asp.net
Username and password information should not be included in a configuration file or a properties file in cleartext as this will allow anyone who can read the file access to the resource. If possible, encrypt this information.
Observed Examples 1
CVE-2022-38665A continuous delivery pipeline management tool stores an unencypted password in a configuration file.
References 2
Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors
Katrina Tsipenyuk, Brian Chess, and Gary McGraw
NIST Workshop on Software Security Assurance Tools Techniques and MetricsNIST
07-11-2005
ID: REF-6
Building Secure Software: How to Avoid Security Problems the Right Way
John Viega and Gary McGraw
Addison-Wesley
2002
ID: REF-207
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Modes of Introduction
Architecture and Design
Implementation
Affected Resources
  1. File or Directory
Taxonomy Mapping
  • 7 Pernicious Kingdoms