Category-485: 7PK -封装

admin 2022年1月14日11:27:07CWE(弱点枚举)评论35 views1264字阅读4分12秒阅读模式

Category-485: 7PK -封装

ID: 485
Status: Draft

Summary

This category represents one of the phyla in the Seven Pernicious Kingdoms vulnerability classification. It includes weaknesses that occur when the product does not sufficiently encapsulate critical data or functionality. According to the authors of the Seven Pernicious Kingdoms, "Encapsulation is about drawing strong boundaries. In a web browser that might mean ensuring that your mobile code cannot be abused by other mobile code. On the server it might mean differentiation between validated data and unvalidated data, between one user's data and another's, or between data users are allowed to see and data that they are not."

Membership

ID NAME
CWE-486 使用名称来比较对象
CWE-488 对错误会话暴露数据元素
CWE-489 遗留的调试代码
CWE-491 公开的可克隆方法(对象劫持)
CWE-492 使用包含敏感数据的内部对象
CWE-493 缺少Final Modifier的关键公开变量
CWE-495 从公开方法中返回私有的数组类型数据域
CWE-496 公开数据赋值给私有的数组类型数据域
CWE-497 将系统数据暴露到未授权控制的范围
CWE-501 违背信任边界

Notes

Other

The "encapsulation" term is used in multiple ways. Within some security sources, the term is used to describe the establishment of boundaries between different control spheres. Within general computing circles, it is more about hiding implementation details and maintainability than security. Even within the security usage, there is also a question of whether "encapsulation" encompasses the entire range of security problems.

References

REF-6 Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors

文章来源于互联网:scap中文网

特别标注: 本站(CN-SEC.COM)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
  • 我的微信
  • 微信扫一扫
  • weinxin
  • 我的微信公众号
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2022年1月14日11:27:07
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                  Category-485: 7PK -封装 http://cn-sec.com/archives/612613.html

发表评论

匿名网友 填写信息

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: