This vulnerability occurs when an application stores sensitive passwords directly within a configuration file, making them easily readable to anyone with access to that file.
Storing passwords in plain text within config files, such as .env, .properties, XML, or YAML files, is a critical security misstep. These files are often committed to version control, deployed with the application, or left in accessible directories, exposing the credentials to developers, system administrators, or even attackers who gain basic access to the system. The core problem is that configuration files are designed for settings, not for safeguarding secrets. An attacker who discovers this file can immediately steal the password to impersonate the application, often gaining the same level of access to databases, external APIs, or administrative systems. In some cases, if the file has write permissions, they could even change the password to one they control, locking out the legitimate application and taking full control of the dependent service. This single flaw can lead to complete system compromise, data breaches, and unauthorized actions performed under the application's identity.
Impact: Gain Privileges or Assume Identity
javajavaasp.net