结构: Simple
Abstraction: Variant
状态: Draft
被利用可能性: unkown
The software calls a function, procedure, or routine, but the caller specifies the arguments in an incorrect order, leading to resultant weaknesses.
While this weakness might be caught by the compiler in some languages, it can occur more frequently in cases in which the called function accepts variable numbers or types of arguments, such as format strings in C. It also can occur in languages or environments that do not enforce strong typing.
cwe_Nature: ChildOf cwe_CWE_ID: 628 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 628 cwe_View_ID: 699 cwe_Ordinal: Primary
范围 | 影响 | 注释 |
---|---|---|
Other | Quality Degradation |
策略:
Use the function, procedure, or routine as specified.
策略:
Because this function call often produces incorrect behavior it will usually be detected during testing or normal operation of the software. During testing exercise all possible control paths will typically expose this weakness except in rare cases when the incorrect function call accidentally produces the correct results or if the provided argument type is very similar to the expected argument type.
The following PHP method authenticates a user given a username/password combination but is called with the parameters in reverse order.
bad PHP
标识 | 说明 | 链接 |
---|---|---|