Category-1009: 审计
ID: 1009
Status: Draft
Summary
Weaknesses in this category are related to the design and architecture of audit-based components of the system. Frequently these deal with logging user activities in order to identify attackers and modifications to the system. The weaknesses in this category could lead to a degradation of the quality of the audit capability if they are not addressed when designing or implementing a secure architecture.
Membership
ID | NAME |
---|---|
CWE-117 | 日志输出的转义处理不恰当 |
CWE-223 | 安全相关信息的遗漏 |
CWE-224 | 通过候选名称导致的安全相关信息混淆 |
CWE-532 | 通过日志文件的信息暴露 |
CWE-778 | 不充分的日志记录 |
CWE-779 | 日志记录过多数据 |
References
REF-9 A Catalog of Security Architecture Weaknesses.
REF-10 Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird.
文章来源于互联网:scap中文网
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论