Introductiemodi
Architecture and Design
Implementation
Toepasselijke platforms
Taal
Class: Not Language-Specific (Undetermined)
Class: Interpreted (Undetermined)
Veelvoorkomende gevolgen
| Bereik |
Impact |
Waarschijnlijkheid |
| Integrity | Execute Unauthorized Code or Commands | |
Other Integrity | Varies by Context, Alter Execution Logic | |
Waargenomen voorbeelden
| Referenties |
Beschrijving |
| Python compiler uses eval() to execute malicious strings as Python code. |
| Cryptography API uses unsafe reflection when deserializing a private key |
| Deserialization issue in commonly-used Java library allows remote execution. |
| Chain: extract used for register_globals compatibility layer, enables path traversal (CWE-22) |
| Source version control product allows modification of trusted key using mass assignment. |
Mogelijke risicobeperkingen
Phases : Implementation
For any externally-influenced input, check the input against an allowlist of acceptable values.
Phases : Implementation // Architecture and Design
Refactor the code so that it does not need to be dynamically managed.
Detectiemethoden
Fuzzing
Fuzz testing (fuzzing) is a powerful technique for generating large numbers of diverse inputs - either randomly or algorithmically - and dynamically invoking the code with those inputs. Even with random inputs, it is often capable of generating unexpected results such as crashes, memory corruption, or resource consumption. Fuzzing effectively produces repeatable test cases that clearly indicate bugs, which helps developers to diagnose the issues.
Effectiviteit : High
Notities kwetsbaarheidsmapping
Rechtvaardiging : This CWE entry is a Class and might have Base-level children that would be more appropriate
Opmerking : Examine children of this entry to see if there is a better fit
Indiening
| Naam |
Organisatie |
Datum |
Releasedatum |
Version |
| CWE Content Team |
MITRE |
2013-01-26 +00:00 |
2013-02-21 +00:00 |
2.4 |
Wijzigingen
| Naam |
Organisatie |
Datum |
Opmerking |
| CWE Content Team |
MITRE |
2015-12-07 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2017-01-19 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2019-06-20 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2020-06-25 +00:00 |
updated Potential_Mitigations |
| CWE Content Team |
MITRE |
2021-10-28 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Detection_Factors, Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
| CWE Content Team |
MITRE |
2023-10-26 +00:00 |
updated Observed_Examples |
| CWE Content Team |
MITRE |
2025-12-11 +00:00 |
updated Applicable_Platforms, Demonstrative_Examples, Weakness_Ordinalities |