结构: Simple
Abstraction: Base
状态: Draft
被利用可能性: unkown
The software, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 699 cwe_Ordinal: Primary
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
['Access Control', 'Integrity'] | ['Bypass Protection Mechanism', 'Modify Application Data'] | An attacker could package untrusted data with trusted data to bypass protection mechanisms to gain access to and possibly modify sensitive data. |
标识 | 说明 | 链接 |
---|---|---|
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Untrusted Data Appended with Trusted Data | ||
The CERT Oracle Secure Coding Standard for Java (2011) | ENV01-J | Place all security-sensitive code in a single JAR and sign and seal it |