SYM_CONF_0307 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki
Insertion of Sensitive Information into Externally-Accessible File or Directory
Property | Value |
---|---|
Language | |
Severity | |
CWE | CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory |
OWASP | A01:2021 - Broken Access Control |
Confidence Level | Low |
Impact Level | High |
Likelihood Level | Low |
Description
Sensitive information like passwords, secrets, tokens, or API keys should not be passed as Docker build arguments, because these values are stored in image metadata and can be easily retrieved by anyone with access to the image. This exposes secrets even after deployment.
Impact
If exploited, attackers with access to the Docker image can extract confidential credentials using tools like 'docker image history' and potentially gain unauthorized access to internal systems, APIs, or databases, leading to data breaches and further compromise of your infrastructure.