[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

External Control of System or Configuration Setting

ID: 15Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: INCOMPLETE
Abstraction Type: Base





Description

One or more system settings or configuration elements can be externally controlled by a user.

Extended Description

Allowing external control of system settings can disrupt service or cause an application to behave in unexpected, and potentially malicious ways.

Applicable Platforms
None

Time Of Introduction

  • Implementation

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Other
 
Varies by context
 
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
  Compartmentalize your system and determine where the trust boundaries exist. Any input/control outside the trust boundary should be treated as potentially hostile.
 
  
Implementation
Architecture and Design
 
 Because setting manipulation covers a diverse set of functions, any attempt at illustrating it will inevitably be incomplete. Rather than searching for a tight-knit relationship between the functions addressed in the setting manipulation category, take a step back and consider the sorts of system values that an attacker should not be allowed to control.
 
  
Implementation
Architecture and Design
 
 In general, do not allow user-provided or otherwise untrusted data to control sensitive values. The leverage that an attacker gains by controlling these values is not always immediately obvious, but do not underestimate the creativity of the attacker.
 
  

Relationships

Related CWETypeViewChain
CWE-15 ChildOf CWE-896 Category CWE-888  

Demonstrative Examples   (Details)

  1. The following C code accepts a number as one of its command line parameters and sets it as the host ID of the current machine.
  2. The following Java code snippet reads a string from an HttpServletRequest and sets it as the active catalog for a database Connection.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
7 Pernicious Kingdoms  Setting Manipulation
 
 

References:
None

CVE    1
CVE-2021-38453

© SecPod Technologies