CWE

Common Weakness Enumeration

社区开发的软件和硬件弱点类型清单

2021 CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
Home>CWE List> cwe-单个字典定义(4.10)
ID

CWE-487:依赖包装级范围

Weakness ID: 487
Abstraction:Base
Structure:Simple
View customized information:
+Description
Java软件包并非固有地关闭;因此,依靠它们进行代码安全不是一个好的做法。
+Extended Description
The purpose of package scope is to prevent accidental access by other parts of a program. This is an ease-of-software-development feature but not a security feature.
+Relationships
Section HelpThis table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+Relevant to the view "Research Concepts" (CWE-1000)
Nature 类型 ID Name
ChildOf Pillar支柱 - 弱点是最抽象的弱点类型,代表了与之相关的所有类别/基础/变体弱点的主题。从技术上讲,柱子与类别不同,因为在技术上仍然是一种描述错误的弱点,而类别代表用于分组相关事物的常见特征。 664 Improper Control of a Resource Through its Lifetime
Section HelpThis table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+与“软件开发”视图相关(CWE-699)
Nature 类型 ID Name
MemberOf 类别类别 - 包含共享共同特征的其他条目的CWE条目。 1006 Bad Coding Practices
+Modes Of Introduction
Section HelpThe different Modes of Introduction provide information about how and when this weakness may be introduced. The Phase identifies a point in the life cycle at which introduction may occur, while the Note provides a typical scenario related to introduction during the given phase.
阶段 Note
Implementation
+Applicable Platforms
Section HelpThis listing shows possible areas for which the given weakness could appear. These may be for specific named Languages, Operating Systems, Architectures, Paradigms, Technologies, or a class of such platforms. The platform is listed along with how frequently the given weakness appears for that instance.

Languages

Java(Undetermined Prevalence)

+Common Consequences
Section HelpThis table specifies different individual consequences associated with the weakness. The Scope identifies the application security area that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in exploiting this weakness. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a weakness will be exploited to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.
Scope 影响 Likelihood
保密

Technical Impact:Read Application Data

如果包含该软件包,可以在Java框架外访问Java软件包中的任何数据。
正直

Technical Impact:Modify Application Data

The data in a Java class can be modified by anyone outside of the Java framework if the packages is distributed.
+Likelihood Of Exploit
Medium
+示例的例子

Example 1

The following example demonstrates the weakness.

(bad code)
Example Language:Java
package math;
public class Lebesgue implements Integration{
公共最终静态字符串YouReHIDETHIDENCTINCTICT(functionTectrate){

返回 ...;
}
}
+潜在的缓解

阶段s: Architecture and Design; Implementation

Data should be private static and final whenever possible. This will assure that your code is protected by instantiating early, preventing access and tampering.
+会员资格
Section HelpThis MemberOf Relationships table shows additional CWE Categories and Views that reference this weakness as a member. This information is often useful in understanding where a weakness fits within the context of external information sources.
Nature 类型 ID Name
MemberOf 类别类别 - 包含共享共同特征的其他条目的CWE条目。 850 Java(2011)第7章的CERT ORACLE安全编码标准 - 方法(MET)
MemberOf 类别类别 - 包含共享共同特征的其他条目的CWE条目。 966 SFP次级群集:其他暴露
+Taxonomy Mappings
Mapped Taxonomy Name Node ID 合身 Mapped Node Name
CLASP Relying on package-level scope
The CERT Oracle Secure Coding Standard for Java (2011) Met04-J Do not increase the accessibility of overridden or hidden methods
+参考
[Ref-18] Secure Software,Inc.。“ The CLASP应用程序安全过程”。2005年。<https://cwe.mitre.org/documents/sources/TheCLASPApplicationSecurityProcess.pdf>。
+Content History
+提交
提交日期 Submitter Organization
2006-07-19 CLASP
+Modifications
Modification Date 修饰符 Organization
2008-07-01 Eric Dalci 雪茄
updated Time_of_Introduction
2008-09-08 CWE Content Team MITRE
updated Common_Consequences, Relationships, Other_Notes, Taxonomy_Mappings
2011-06-01 CWE Content Team MITRE
updated Common_Consequences, Relationships, Taxonomy_Mappings
2012-05-11 CWE Content Team MITRE
更新的关系,分类_mappings
2012-10-30 CWE Content Team MITRE
updated Potential_Mitigations
2014-06-23 CWE Content Team MITRE
updated Description, Other_Notes, Potential_Mitigations
2014-07-30 CWE Content Team MITRE
updated Relationships
2017-11-08 CWE Content Team MITRE
updated Demonstrative_Examples, Relationships
2019-01-03 CWE Content Team MITRE
更新的分类法_ mappings
2020-02-24 CWE Content Team MITRE
updated References, Type
+Previous Entry Names
Change Date Previous Entry Name
2008-04-11 Relying on Package-level Scope
提供更多信息 - 请选择其他过滤器。
Page Last Updated:January 31, 2023