结构: Simple
Abstraction: Base
状态: Incomplete
被利用可能性: unkown
The wrong "handler" is assigned to process an object.
An example of deploying the wrong handler would be calling a servlet to reveal source code of a .JSP file, or automatically "determining" type of the object even if it is contradictory to an explicitly specified type.
cwe_Nature: ChildOf cwe_CWE_ID: 691 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: CanPrecede cwe_CWE_ID: 433 cwe_View_ID: 1000
cwe_Nature: PeerOf cwe_CWE_ID: 434 cwe_View_ID: 1000
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
['Integrity', 'Other'] | ['Varies by Context', 'Unexpected State'] |
策略:
Perform a type check before interpreting an object.
策略:
Reject any inconsistent types, such as a file with a .GIF extension that appears to consist of PHP code.
标识 | 说明 | 链接 |
---|---|---|
CVE-2001-0004 | Source code disclosure via manipulated file extension that causes parsing by wrong DLL. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0004 |
CVE-2002-0025 | Web browser does not properly handle the Content-Type header field, causing a different application to process the document. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0025 |
CVE-2000-1052 | Source code disclosure by directly invoking a servlet. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1052 |
CVE-2002-1742 | Arbitrary Perl functions can be loaded by calling a non-existent function that activates a handler. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1742 |
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Improper Handler Deployment |