CWE

普遍的弱点

社区开发的软件和硬件弱点类型清单

2021 CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
Home>CWE List> cwe-单个字典定义(4.10)
ID

CWE-471: Modification of Assumed-Immutable Data (MAID)

Weakness ID: 471
Abstraction:Base
Structure:Simple
查看自定义信息:
+描述
The product does not properly protect an assumed-immutable element from being modified by an attacker.
+扩展描述
This occurs when a particular input is critical enough to the functioning of the application that it should not be modifiable at all, but it is. Certain resources are often assumed to be immutable when they are not, such as hidden form fields in web applications, cookies, and reverse DNS lookups.
+Relationships
Section HelpThis table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+与观点“研究概念”相关(CWE-1000)
Nature 类型 ID Name
ChildOf 支柱支柱 - 弱点是最抽象的弱点类型,代表了与之相关的所有类别/基础/变体弱点的主题。从技术上讲,柱子与类别不同,因为在技术上仍然是一种描述错误的弱点,而类别代表用于分组相关事物的常见特征。 664 一生对资源的控制不当
父母 变体变体- a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource. 291 依靠IP地址以进行身份​​验证
父母 Base基础 - 仍然主要独立于资源或技术的弱点,但有足够的细节来提供特定的检测和预防方法。基本水平的弱点通常用以下维度的2或3来描述问题:行为,财产,技术,语言和资源。 472 假定的免疫网络参数的外部控制
父母 变体变体- a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource. 473 PHP External Variable Modification
父母 变体变体- a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource. 607 Public Static Final Field References Mutable Object
可以按照 Base基础 - 仍然主要独立于资源或技术的弱点,但有足够的细节来提供特定的检测和预防方法。基本水平的弱点通常用以下维度的2或3来描述问题:行为,财产,技术,语言和资源。 425 Direct Request ('Forced Browsing')
可以按照 Class班级 - 以非常抽象的方式描述的弱点,通常与任何特定的语言或技术无关。比支柱弱点更具体,但比基本弱点更一般。班级弱点通常用以下维度的1或2来描述问题:行为,属性和资源。 602 服务器端安全性的客户端执行
可以按照 Base基础 - 仍然主要独立于资源或技术的弱点,但有足够的细节来提供特定的检测和预防方法。基本水平的弱点通常用以下维度的2或3来描述问题:行为,财产,技术,语言和资源。 621 Variable Extraction Error
可以按照 Base基础 - 仍然主要独立于资源或技术的弱点,但有足够的细节来提供特定的检测和预防方法。基本水平的弱点通常用以下维度的2或3来描述问题:行为,财产,技术,语言和资源。 1282 假定的免疫数据存储在可写的内存中
可以按照 变体变体- a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource. 1321 对象原型属性(“原型污染”)的不当控制修改
Section HelpThis table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+与“软件开发”视图相关(CWE-699)
Nature 类型 ID Name
成员 类别类别 - 包含共享共同特征的其他条目的CWE条目。 19 Data Processing Errors
+Modes Of Introduction
Section HelpThe different Modes of Introduction provide information about how and when this weakness may be introduced. The Phase identifies a point in the life cycle at which introduction may occur, while the Note provides a typical scenario related to introduction during the given phase.
阶段 Note
执行
建筑和设计
+Applicable Platforms
Section HelpThis listing shows possible areas for which the given weakness could appear. These may be for specific named Languages, Operating Systems, Architectures, Paradigms, Technologies, or a class of such platforms. The platform is listed along with how frequently the given weakness appears for that instance.

Languages

Class: Not Language-Specific(Undetermined Prevalence)

+Common Consequences
Section HelpThis table specifies different individual consequences associated with the weakness. The Scope identifies the application security area that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in exploiting this weakness. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a weakness will be exploited to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.
Scope 影响 Likelihood
正直

Technical Impact:修改应用程序数据

Common data types that are attacked are environment variables, web application parameters, and HTTP headers.
正直

Technical Impact:Unexpected State

+示例的例子

示例1

在下面的代码摘录中,尽管阵列可变,但通过Java方法返回的数组仍被修改。

(bad code)
示例语言:Java
string []颜色= car.getAllPossibleColors();
colors[0] = "Red";
+观察到的例子
参考 描述
依靠$ php_self变量进行身份验证。
Gain privileges by modifying assumed-immutable code addresses that are accessed by a driver.
+潜在的缓解

阶段:建筑和设计;手术;执行

当数据通过不受信任的来源存储或传输时,可以修改数据,实现完整性检查以检测未经授权的修改,或将数据存储/传输数据在没有外部影响的受信任的位置中。
+会员资格
Section HelpThis MemberOf Relationships table shows additional CWE Categories and Views that reference this weakness as a member. This information is often useful in understanding where a weakness fits within the context of external information sources.
Nature 类型 ID Name
成员 类别类别 - 包含共享共同特征的其他条目的CWE条目。 991 SFP辅助群集:对环境的污染输入
成员 类别类别 - 包含共享共同特征的其他条目的CWE条目。 1347 OWASP前十2021年A03:2021-注射
+Notes

Relationship

女佣问题可能是许多其他弱点的主要问题,它们是语言的主要因素,可轻松访问内部程序构造,例如PHP的register_globals和类似功能。但是,女佣问题也可能是由于修改内部状态的弱点而引起的。例如,程序可能会验证某些数据并将其存储在内存中,但是缓冲区溢出可以覆盖该数据验证的数据,从而导致程序逻辑发生变化。

理论

在许多示例中,突变性能是漏洞的主要因素。
+分类映射
Mapped Taxonomy Name Node ID 合身 Mapped Node Name
PLOVER 修改假定的不受欢迎的数据
+Content History
+提交
提交日期 Submitter 组织
2006-07-19 PLOVER
+Modifications
Modification Date 修饰符 组织
2008-07-01 Sean Eidemiller 雪茄
added/updated demonstrative examples
2008-07-01 Eric Dalci 雪茄
更新的势_METIGATIONS,time_of_introduction
2008-09-08 CWE Content Team MITRE
更新的关系, Other_Notes, Taxonomy_Mappings
2009-07-27 CWE Content Team MITRE
更新其他_notes
2010-02-16 CWE Content Team MITRE
更新的势_MINEIGATIONS
2010-04-05 CWE Content Team MITRE
updated Related_Attack_Patterns
2010-12-13 CWE Content Team MITRE
updated Related_Attack_Patterns
2011-06-01 CWE Content Team MITRE
更新的common_cconsquences
2012-05-11 CWE Content Team MITRE
更新的关系
2013-02-21 CWE Content Team MITRE
更新的关系
2013-07-17 CWE Content Team MITRE
更新的关系
2014-02-18 CWE Content Team MITRE
updated Related_Attack_Patterns
2014-06-23 CWE Content Team MITRE
updated Applicable_Platforms, Common_Consequences, Description, Other_Notes, Potential_Mitigations, Relationship_Notes, Theoretical_Notes, Time_of_Introduction
2014-07-30 CWE Content Team MITRE
更新的关系
2017-05-03 CWE Content Team MITRE
updated Related_Attack_Patterns
2018-03-27 CWE Content Team MITRE
更新的关系
2020-02-24 CWE Content Team MITRE
更新的关系
2020-06-25 CWE Content Team MITRE
更新的关系
2020-12-10 CWE Content Team MITRE
更新的关系
2021-10-28 CWE Content Team MITRE
更新的关系
2023-01-31 CWE Content Team MITRE
updated Description
提供更多信息 - 请选择其他过滤器。
Page Last Updated:January 31, 2023