CWE-623 不安全的ActiveX控件被标记为脚本安全
Unsafe ActiveX Control Marked Safe For Scripting
结构: Simple
Abstraction: Variant
状态: Draft
被利用可能性: unkown
基本描述
An ActiveX control is intended for restricted use, but it has been marked as safe-for-scripting.
扩展描述
This might allow attackers to use dangerous functionality via a web page that accesses the control, which can lead to different resultant vulnerabilities, depending on the control's behavior.
相关缺陷
-
cwe_Nature: ChildOf cwe_CWE_ID: 267 cwe_View_ID: 1000 cwe_Ordinal: Primary
-
cwe_Nature: ChildOf cwe_CWE_ID: 267 cwe_View_ID: 699 cwe_Ordinal: Primary
-
cwe_Nature: ChildOf cwe_CWE_ID: 691 cwe_View_ID: 1000
-
cwe_Nature: PeerOf cwe_CWE_ID: 618 cwe_View_ID: 1000
常见的影响
范围 | 影响 | 注释 |
---|---|---|
['Confidentiality', 'Integrity', 'Availability'] | Execute Unauthorized Code or Commands |
可能的缓解方案
Architecture and Design
策略:
During development, do not mark it as safe for scripting.
System Configuration
策略:
After distribution, you can set the kill bit for the control so that it is not accessible from Internet Explorer.
分析过的案例
标识 | 说明 | 链接 |
---|---|---|
CVE-2007-0617 | add emails to spam whitelist | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0617 |
CVE-2007-0219 | web browser uses certain COM objects as ActiveX | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0219 |
CVE-2006-6510 | kiosk allows bypass to read files | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6510 |
Notes
引用
文章来源于互联网:scap中文网
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论