Stack Traces
Description
Stack traces provide detailed information about a program's execution path at the moment an exception or error occurs. In a development environment, this information is invaluable for debugging, showing which functions were called, on which lines errors occurred, and sometimes which libraries or framework versions are in use. However, when applications expose stack traces in production, attackers can glean critical details about server configurations, file paths, database structure, or underlying frameworks. This in-depth insight can be used to plan targeted attacks, exploit known vulnerabilities, or map out potential points of entry.
Often, stack trace exposure stems from misconfigured error-handling settings, unhandled exceptions, or debug modes inadvertently left enabled in a live environment. Minimizing or hiding these traces from end users (while still logging them securely for developers) is a key practice in application security.
Examples
Full Framework Trace
A Java application throws a NullPointerException
that's not caught by any custom error handler, causing a default Tomcat/Java error page to be displayed:
java.lang.NullPointerException
at com.example.app.UserService.getUserById(UserService.java:45)
at com.example.app.UserController.handleRequest(UserController.java:67)
...
This reveals class names, method names, and file locations. Attackers learn about the application's internal package structure, potentially identifying classes or services that may have known vulnerabilities.
Python Traceback with Library Versions
A Flask application running in debug mode returns a detailed Python traceback, including environment details:
Traceback (most recent call last):
File "/path/to/flask/app.py", line 200, in create_user
user = User(name=request.form['username'])
KeyError: 'username'
In addition to code specifics (like line numbers), the traceback may display the versions of Python, Flask, or other libraries—helping attackers check for unpatched vulnerabilities in those dependencies.
Hidden Configuration Data
Sometimes stack traces include environment variables or sensitive connection strings if these variables are referenced directly in the error path. For instance, a database connection error might display the full connection URL, username, or partial passwords.
Remediation
-
Use Production-Grade Error Handling
- Disable debug or developer modes in production. Many frameworks (Spring Boot, Express.js, Django, Rails) offer a separate production configuration that suppresses stack traces in user-facing responses.
-
Implement Custom Error Pages
- Catch and handle all exceptions within application code or through a global error-handling mechanism (middleware, filters, decorators).
- Provide only generic error messages to the user, such as "An error occurred" or "Something went wrong."
-
Log Internally, Not Publicly
- Store detailed stack traces and debug logs in server-side log files or centralized logging systems (e.g., ELK stack, Splunk).
- Ensure these logs are only accessible to authorized administrators or developers.