This vulnerability occurs when an application sends sensitive data, such as passwords or personal information, over a network connection without using encryption. Attackers can easily intercept and read this unprotected data as it travels.

When data is transmitted in cleartext, it's like sending a postcard instead of a sealed letter—anyone handling it can read the contents. This is a fundamental security failure because modern networks, especially public Wi-Fi, are shared environments where attackers use simple 'sniffing' tools to capture traffic. Sensitive information like login credentials, session tokens, financial details, or personal data should never be exposed this way. The solution is to always use strong encryption for all communication channels. This means enforcing HTTPS (TLS/SSL) for web traffic and encrypted protocols like SSH or VPNs for other connections. Developers should implement encryption by default, avoid mixed content (HTTP within HTTPS pages), and use security headers like HTTP Strict Transport Security (HSTS) to prevent accidental cleartext transmission.
Impact: Read Application DataModify Files or Directories
Anyone can read the information by gaining access to the channel being used for communication. Many communication channels can be "sniffed" (monitored) by adversaries during data transmission. For example, in networking, packets can traverse many intermediary nodes from the source to the destination, whether across the internet, an internal network, the cloud, etc. Some actors might have privileged access to a network interface or any link along the channel, such as a router, but they might not be authorized to collect the underlying data. As a result, network traffic could be sniffed by adversaries, spilling security-critical data.
Impact: Read Application DataModify Files or DirectoriesOther
When full communications are recorded or logged, such as with a packet dump, an adversary could attempt to obtain the dump long after the transmission has occurred and try to "sniff" the cleartext from the recorded communications in the dump itself. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
java
//...* }
shelljsonshelljsonHigh