This vulnerability occurs when an application unintentionally reveals sensitive details about its underlying system, such as file paths, software versions, or environment data, to users who should not have access to that information.
Applications, especially web apps, run on top of complex systems like operating servers. When they generate errors, debug logs, or even normal responses, they can leak technical details—stack traces, installed packages, directory structures, or server banners. Attackers actively seek out this information to map your system's architecture and identify specific software versions with known exploits, making their attacks far more precise and dangerous. Preventing these leaks requires scrutinizing all output channels, from error messages to API headers and log files, to ensure they are sanitized before reaching an end-user. While SAST tools can flag patterns of information disclosure, managing this at scale across a large codebase is challenging. An ASPM like Plexicus helps by continuously monitoring for these exposures in production and development, using AI to prioritize the risk and suggest specific code fixes to harden your system's responses.
Impact: Read Application Data
c//assume getCurrentUser() returns a username that is guaranteed to be alphanumeric (avoiding CWE-78)* $userName = getCurrentUser(); $command = 'ps aux | grep ' . $userName; system($command);
javajavac#