CWE-430 错误句柄的实施

Deployment of Wrong Handler

结构: Simple

Abstraction: Base

状态: Incomplete

被利用可能性: unkown

基本描述

The wrong "handler" is assigned to process an object.

扩展描述

An example of deploying the wrong handler would be calling a servlet to reveal source code of a .JSP file, or automatically "determining" type of the object even if it is contradictory to an explicitly specified type.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 691 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: CanPrecede cwe_CWE_ID: 433 cwe_View_ID: 1000

  • cwe_Nature: PeerOf cwe_CWE_ID: 434 cwe_View_ID: 1000

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
['Integrity', 'Other'] ['Varies by Context', 'Unexpected State']

可能的缓解方案

Architecture and Design

策略:

Perform a type check before interpreting an object.

Architecture and Design

策略:

Reject any inconsistent types, such as a file with a .GIF extension that appears to consist of PHP code.

分析过的案例

标识 说明 链接
CVE-2001-0004 Source code disclosure via manipulated file extension that causes parsing by wrong DLL. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0004
CVE-2002-0025 Web browser does not properly handle the Content-Type header field, causing a different application to process the document. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0025
CVE-2000-1052 Source code disclosure by directly invoking a servlet. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1052
CVE-2002-1742 Arbitrary Perl functions can be loaded by calling a non-existent function that activates a handler. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1742

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
PLOVER Improper Handler Deployment

相关攻击模式

  • CAPEC-11

引用