CWE-430 错误句柄的实施

admin 2022年1月5日20:59:57CWE(弱点枚举)评论14 views1583字阅读5分16秒阅读模式

CWE-430 错误句柄的实施

Deployment of Wrong Handler

结构: Simple

Abstraction: Base

状态: Incomplete

被利用可能性: unkown

基本描述

The wrong "handler" is assigned to process an object.

扩展描述

An example of deploying the wrong handler would be calling a servlet to reveal source code of a .JSP file, or automatically "determining" type of the object even if it is contradictory to an explicitly specified type.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 691 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: CanPrecede cwe_CWE_ID: 433 cwe_View_ID: 1000

  • cwe_Nature: PeerOf cwe_CWE_ID: 434 cwe_View_ID: 1000

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
['Integrity', 'Other'] ['Varies by Context', 'Unexpected State']

可能的缓解方案

Architecture and Design

策略:

Perform a type check before interpreting an object.

Architecture and Design

策略:

Reject any inconsistent types, such as a file with a .GIF extension that appears to consist of PHP code.

分析过的案例

标识 说明 链接
CVE-2001-0004 Source code disclosure via manipulated file extension that causes parsing by wrong DLL. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0004
CVE-2002-0025 Web browser does not properly handle the Content-Type header field, causing a different application to process the document. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0025
CVE-2000-1052 Source code disclosure by directly invoking a servlet. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1052
CVE-2002-1742 Arbitrary Perl functions can be loaded by calling a non-existent function that activates a handler. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1742

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
PLOVER Improper Handler Deployment

相关攻击模式

  • CAPEC-11

引用

文章来源于互联网:scap中文网

特别标注: 本站(CN-SEC.COM)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
  • 我的微信
  • 微信扫一扫
  • weinxin
  • 我的微信公众号
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2022年1月5日20:59:57
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                  CWE-430 错误句柄的实施 http://cn-sec.com/archives/612853.html

发表评论

匿名网友 填写信息

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: