CWE

Common Weakness Enumeration

A Community-Developed List of Software & Hardware Weakness Types

2021 CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
>CWE列表> CWE- Individual Dictionary Definition (4.10)
ID

CWE-941: Incorrectly Specified Destination in a Communication Channel

Weakness ID: 941
抽象:根据
Structure:Simple
View customized information:
+Description
该产品创建了通信渠道,以向演员发出传出请求,但不能正确指定该演员的预期目的地。
+Extended Description

目的地的攻击者可能能够欺骗受信任的服务器窃取数据或导致服务拒绝。

There are at least two distinct weaknesses that can cause the product to communicate with an unintended destination:

  • If the product allows an attacker to control which destination is specified, then the attacker can cause it to connect to an untrusted or malicious destination. For example, because UDP is a connectionless protocol, UDP packets can be spoofed by specifying a false source address in the packet; when the server receives the packet and sends a reply, it will specify a destination by using the source of the incoming packet - i.e., the false source. The server can then be tricked into sending traffic to the wrong host, which is effective for hiding the real source of an attack and for conducting a distributed denial of service (DDoS). As another example, server-side request forgery (SSRF) and XML External Entity (XXE) can be used to trick a server into making outgoing requests to hosts that cannot be directly accessed by the attacker due to firewall restrictions.
  • 如果产品错误地指定了目的地,那么可以控制此目的地的攻击者可能会欺骗受信任的服务器。尽管最常见的发生可能是由于管理员的配置错误,但这可能是其他弱点引起的。例如,该产品可能会错误地解析电子邮件或IP地址,并将敏感数据发送到意外的目的地。作为另一个例子,Android应用程序可以使用“粘性广播”与接收器进行特定应用程序通信,但是由于 * Any *接收器可以处理粘性广播,因此可以允许恶意应用程序访问限制性数据,仅限打算用于不同的应用程序。
+关系
部分帮助This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+Relevant to the view "Research Concepts" (CWE-1000)
Nature Type ID Name
ChildOf 班级班级 - 以非常抽象的方式描述的弱点,通常与任何特定的语言或技术无关。比支柱弱点更具体,但比基本弱点更一般。班级弱点通常用以下维度的1或2来描述问题:行为,属性和资源。 923 Improper Restriction of Communication Channel to Intended Endpoints
CanPrecede 班级班级 - 以非常抽象的方式描述的弱点,通常与任何特定的语言或技术无关。比支柱弱点更具体,但比基本弱点更一般。班级弱点通常用以下维度的1或2来描述问题:行为,属性和资源。 406 Insufficient Control of Network Message Volume (Network Amplification)
部分帮助This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+Relevant to the view "Software Development" (CWE-699)
Nature Type ID Name
MemberOf 类别类别- a CWE entry that contains a set of other entries that share a common characteristic. 417 Communication Channel Errors
部分帮助This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+Relevant to the view "Architectural Concepts" (CWE-1008)
Nature Type ID Name
MemberOf 类别类别- a CWE entry that contains a set of other entries that share a common characteristic. 1014 识别演员
+Modes Of Introduction
部分帮助The different Modes of Introduction provide information about how and when this weakness may be introduced. The Phase identifies a point in the life cycle at which introduction may occur, while the Note provides a typical scenario related to introduction during the given phase.
阶段 Note
Architecture and Design
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.
+Applicable Platforms
部分帮助This listing shows possible areas for which the given weakness could appear. These may be for specific named Languages, Operating Systems, Architectures, Paradigms, Technologies, or a class of such platforms. The platform is listed along with how frequently the given weakness appears for that instance.

Languages

班级:不是特定语言的(不确定的患病率)

Technologies

课程:移动设备(不确定的患病率)

+Demonstrative Examples

Example 1

该代码在DNS请求的端口上听,并将结果发送到请求地址。

(不良代码)
Example Language:Python
sock = socket.socket(socket.af_inet,socket.sock_dgram)
sock.bind( (UDP_IP,UDP_PORT) )
while true:
data = sock.recvfrom(1024)
如果没有数据:
break

(requestIP, nameToResolve) = parseUDPpacket(data)
record = resolveName(nameToResolve)
sendResponse(requestip,记录)

此代码将DNS记录发送到请求的IP地址。UDP允许轻松更改源IP地址(“欺骗”),从而使攻击者可以将响应重定向到目标,然后可能会被网络流量淹没。

+观察到的例子
Reference Description
composite: NTP feature generates large responses (high amplification factor) with spoofed UDP source addresses.
班级ic "Smurf" attack, using spoofed ICMP packets to broadcast addresses.
DNS query with spoofed source address causes more traffic to be returned to spoofed address than was sent by the attacker.
+参考
[REF-941] US-CERT。“基于UDP的放大攻击”。2014-01-17。<https://www.us-cert.gov/ncas/alerts/ta14-017a>.
+Content History
+Submissions
Submission Date 提交者 Organization
2014-02-13 CWE内容团队 MITRE
+Modifications
Modification Date 修饰符 Organization
2017-11-08 CWE内容团队 MITRE
updated Modes_of_Introduction, References, Relationships
2020-02-24 CWE内容团队 MITRE
更新了适用的_platforms,关系
2021-03-15 CWE内容团队 MITRE
更新的维护_notes
2023-01-31 CWE内容团队 MITRE
更新的描述
More information is available — Please select a different filter.
Page Last Updated:January 31, 2023