结构: Simple
Abstraction: Base
状态: Draft
被利用可能性: unkown
The software does not verify, or incorrectly verifies, the cryptographic signature for data.
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 1003 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 699
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
['Access Control', 'Integrity', 'Confidentiality'] | ['Gain Privileges or Assume Identity', 'Modify Application Data', 'Execute Unauthorized Code or Commands'] | An attacker could gain access to sensitive data and possibly execute unauthorized code. |
In the following code, a JarFile object is created from a downloaded file.
bad Java
The JAR file that was potentially downloaded from an untrusted source is created without verifying the signature (if present). An alternate constructor that accepts a boolean verify parameter should be used instead.
标识 | 说明 | 链接 |
---|---|---|
CVE-2002-1796 | Does not properly verify signatures for "trusted" entities. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1796 |
CVE-2005-2181 | Insufficient verification allows spoofing. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2181 |
CVE-2005-2182 | Insufficient verification allows spoofing. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2182 |
CVE-2002-1706 | Accepts a configuration file without a Message Integrity Check (MIC) signature. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1706 |
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Improperly Verified Signature | ||
The CERT Oracle Secure Coding Standard for Java (2011) | SEC06-J | Do not rely on the default automatic signature verification provided by URLClassLoader and java.util.jar |