CWE-623 不安全的ActiveX控件被标记为脚本安全

admin 2021年12月16日16:17:48评论50 views字数 1397阅读4分39秒阅读模式

CWE-623 不安全的ActiveX控件被标记为脚本安全

Unsafe ActiveX Control Marked Safe For Scripting

结构: Simple

Abstraction: Variant

状态: Draft

被利用可能性: unkown

基本描述

An ActiveX control is intended for restricted use, but it has been marked as safe-for-scripting.

扩展描述

This might allow attackers to use dangerous functionality via a web page that accesses the control, which can lead to different resultant vulnerabilities, depending on the control's behavior.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 267 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 267 cwe_View_ID: 699 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 691 cwe_View_ID: 1000

  • cwe_Nature: PeerOf cwe_CWE_ID: 618 cwe_View_ID: 1000

常见的影响

范围 影响 注释
['Confidentiality', 'Integrity', 'Availability'] Execute Unauthorized Code or Commands

可能的缓解方案

Architecture and Design

策略:

During development, do not mark it as safe for scripting.

System Configuration

策略:

After distribution, you can set the kill bit for the control so that it is not accessible from Internet Explorer.

分析过的案例

标识 说明 链接
CVE-2007-0617 add emails to spam whitelist https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0617
CVE-2007-0219 web browser uses certain COM objects as ActiveX https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0219
CVE-2006-6510 kiosk allows bypass to read files https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6510

Notes

引用

文章来源于互联网:scap中文网

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年12月16日16:17:48
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-623 不安全的ActiveX控件被标记为脚本安全http://cn-sec.com/archives/613074.html

发表评论

匿名网友 填写信息