logo

066 Technical information leak - Console functions


Description

The application uses console functions: log, info, warning. The usage of these functions in productions environments may lead to information leakages and reveal vulnerable methods, technologies, or logic.


Impact

Gather technical information to craft more complex attack vectors.


Recommendation

Avoid the use of console functions in production environments. Instead, encourage the use of logs to register errors and exceptional events


Threat

Authenticated attacker from the Internet.


Expected Remediation Time

15 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: N
  • Attack complexity: H
  • Attack Requirements: N
  • Privileges required: L
  • User interaction: N
  • Confidentiality (VC): L
  • Integrity (VI): N
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: P

Requirements


Fixes


Last updated

2024/02/09