Einführungsmodi
Implementation
Operation
Anwendbare Plattformen
Sprache
Class: Not Language-Specific (Undetermined)
Häufige Konsequenzen
| Bereich |
Auswirkung |
Wahrscheinlichkeit |
| Other | Other | |
Beobachtete Beispiele
| Referenzen |
Beschreibung |
| In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL. |
| Server allows remote attackers to read files and resource fork content via HTTP requests to certain special file names related to multiple data streams in HFS+. |
| Server allows remote attackers to cause a denial of service via a series of requests to .JSP files that contain an MS-DOS device name. |
Erkennungsmethoden
Automated Static Analysis - Binary or Bytecode
Wirksamkeit : SOAR Partial
Manual Static Analysis - Binary or Bytecode
Wirksamkeit : SOAR Partial
Dynamic Analysis with Automated Results Interpretation
Wirksamkeit : SOAR Partial
Dynamic Analysis with Manual Results Interpretation
Wirksamkeit : SOAR Partial
Manual Static Analysis - Source Code
Wirksamkeit : High
Automated Static Analysis - Source Code
Wirksamkeit : SOAR Partial
Architecture or Design Review
Wirksamkeit : High
Hinweise zur Schwachstellen-Zuordnung
Begründung : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Kommentar : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Referenzen
REF-1479
State-of-the-Art Resources (SOAR) for Software Vulnerability Detection, Test, and Evaluation
Gregory Larsen, E. Kenneth Hong Fong, David A. Wheeler, Rama S. Moorthy.
https://www.ida.org/-/media/feature/publications/s/st/stateoftheart-resources-soar-for-software-vulnerability-detection-test-and-evaluation/p-5061.ashx
Einreichung
| Name |
Organisation |
Datum |
Veröffentlichungsdatum |
Version |
| PLOVER |
|
2006-07-19 +00:00 |
2006-07-19 +00:00 |
Draft 3 |
Änderungen
| Name |
Organisation |
Datum |
Kommentar |
| Eric Dalci |
Cigital |
2008-07-01 +00:00 |
updated Time_of_Introduction |
| CWE Content Team |
MITRE |
2008-09-08 +00:00 |
updated Description, Relationships, Taxonomy_Mappings, Type |
| CWE Content Team |
MITRE |
2009-03-10 +00:00 |
updated Description, Name |
| CWE Content Team |
MITRE |
2011-06-01 +00:00 |
updated Common_Consequences |
| CWE Content Team |
MITRE |
2012-05-11 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2014-07-30 +00:00 |
updated Detection_Factors, Relationships |
| CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Affected_Resources, Applicable_Platforms, Relationships |
| CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships, Time_of_Introduction |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
| CWE Content Team |
MITRE |
2023-10-26 +00:00 |
updated Observed_Examples |
| CWE Content Team |
MITRE |
2025-09-09 +00:00 |
updated Detection_Factors, References |
| CWE Content Team |
MITRE |
2025-12-11 +00:00 |
updated Demonstrative_Examples, Weakness_Ordinalities |