The product generates an error message that includes sensitive information about its environment, users, or associated data.

Impact: Read Application Data
Often this will either reveal sensitive information which may be used to launch another, more focused attack or disclose private information stored in the server. For example, an attempt to exploit a path traversal weakness (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) might yield the full pathname of the installed application. In turn, this could be used to select the proper number of ".." sequences to navigate to the targeted file. An attack using SQL injection (Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')) might not initially succeed, but an error message could reveal the malformed query, which would expose query logic and possibly even passwords or other sensitive information used within the query.
Strategy: Attack Surface Reduction
Effectiveness: Defense in Depth
Strategy: Compilation or Build Hardening
Strategy: Environment Hardening
javaphp
//print exception message that includes exception message and configuration file location* catch (Exception $e) { ``` echo 'Caught exception: ', $e->getMessage(), '\n'; echo 'Check credentials in config file at: ', $Mysql_config_location, '\n'; }
perl
perl
javaHigh