A development team is implementing secure coding practices. Which of the following represents the MOST serious security flaw that should be addressed immediately?
Insufficient input validation on a user registration form
Lack of proper error handling in a file upload feature
Using HTTP instead of HTTPS for the application's admin portal
Hard-coded credentials in the application source code
The most serious flaw is hard-coded credentials in the application source code because credentials embedded in source code can be discovered through code repository access, decompilation, or if the code is leaked. This provides attackers with privileged access that is difficult to rotate or revoke, especially if the credentials are distributed with the application. Additionally, hard-coded credentials often represent a violation of the principle of least privilege and can persist across multiple environments.
Insufficient input validation is a serious issue that can lead to various attacks like SQL injection or XSS, but it typically requires an active exploitation attempt and can be mitigated through proper validation implementation. It's less severe than exposing credentials directly in the code.
**Lack of proper error handling **may leak sensitive information but typically doesn't directly grant access to the attacker. While important to fix, it generally presents less immediate risk than exposed credentials.
Using HTTP instead of HTTPS for an admin portal is a significant issue that could expose credentials during transmission, but it still requires an attacker to intercept the traffic in a man-in-the-middle scenario. Hard-coded credentials are more readily accessible to anyone who can view the source code.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are hard-coded credentials and why are they a problem in secure coding?
Open an interactive chat with Bash
What is the principle of least privilege and how does it relate to hard-coded credentials?
Open an interactive chat with Bash
How can developers prevent hard-coded credentials in their applications?
Open an interactive chat with Bash
ISC2 CISSP
Software Development Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access