结构: Simple
Abstraction: Base
状态: Draft
被利用可能性: unkown
A constant symbolic reference to an object is used, even though the reference can resolve to a different object over time.
cwe_Nature: ChildOf cwe_CWE_ID: 706 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: PeerOf cwe_CWE_ID: 367 cwe_View_ID: 1000
cwe_Nature: PeerOf cwe_CWE_ID: 610 cwe_View_ID: 1000
cwe_Nature: PeerOf cwe_CWE_ID: 486 cwe_View_ID: 1000
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
Access Control | Gain Privileges or Assume Identity | The attacker can gain access to otherwise unauthorized resources. |
['Integrity', 'Confidentiality', 'Other'] | ['Modify Application Data', 'Modify Files or Directories', 'Read Application Data', 'Read Files or Directories', 'Other'] | Race conditions such as this kind may be employed to gain read or write access to resources not normally readable or writable by the user in question. |
['Integrity', 'Other'] | ['Modify Application Data', 'Other'] | The resource in question, or other resources (through the corrupted one) may be changed in undesirable ways by a malicious user. |
Non-Repudiation | Hide Activities | If a file or other resource is written in this method, as opposed to a valid way, logging of the activity may not occur. |
['Non-Repudiation', 'Integrity'] | Modify Files or Directories | In some cases it may be possible to delete files that a malicious user might not otherwise have access to -- such as log files. |
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
CLASP | Symbolic name not mapping to correct object |