CWE-13

ASP.NET Misconfiguration: Password in Configuration File

Storing a plaintext password in a configuration file allows anyone who can read the file access to the password-protected resource making them an easy target for attackers.

Mitigation

Phase: Implementation

Description:

  • Credentials stored in configuration files should be encrypted, Use standard APIs and industry accepted algorithms to encrypt the credentials stored in configuration files.

No CAPEC attack patterns related to this CWE.

Back to CWE stats page