logo

Database

Config Files Private Key Pem

Description

The source code repository contains sensitive information: Private Key PEM Header

Weakness:

385 - Non-encrypted confidential information - Keys

Category: Information Collection

Detection Strategy

    Matches Private Key PEM Header patterns in source code and configuration files

Vulnerable code example

-----BEGIN PRIVATE KEY-----
MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC7o4qne60TB3wo
-----BEGIN PRIVATE KEY-----
    MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC7o4qne60TB3wo
-----BEGIN RSA PRIVATE KEY-----
MIIEowIBAAKCAQEA0a3Bq7r8Zk2vJhFdpNmGsLtYxWcXeUoiPQlAkHnT6ywV5g
-----BEGIN EC PRIVATE KEY-----
MHQCAQEEIPNIVgRc9mL7aJ6VzAGjr4nM3pKoHs1tYX2eZqDcWfBuoAoGCCqGSM...