结构: Simple
Abstraction: Class
状态: Draft
被利用可能性: unkown
The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
['Integrity', 'Other'] | ['Varies by Context', 'Unexpected State'] |
Relationship "origin validation" could fall under this. Maintenance The specific ways in which the origin is not properly identified should be laid out as separate weaknesses. In some sense, this is more like a category.
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Insufficient Verification of Data | ||
OWASP Top Ten 2004 | A3 | CWE More Specific | Broken Authentication and Session Management |
WASC | 12 | Content Spoofing |