Category Archives: CWE

CWE-1083 – Data Access from Outside Expected Data Manager Component

Read Time:16 Second

Description

The software is intended to manage data access through a particular data manager component such as a relational or non-SQL database, but it contains code that performs data access operations without using that component.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1061

 

Consequences

Other: Reduce Reliability

 

Potential Mitigations

CVE References

CWE-1048 – Invokable Control Element with Large Number of Outward Calls

Read Time:16 Second

Description

The code contains callable control elements that
contain an excessively large number of references to other
application objects external to the context of the callable,
i.e. a Fan-Out value that is excessively large.

Modes of Introduction:

 

 

Related Weaknesses

CWE-710

 

Consequences

Other: Reduce Maintainability

 

Potential Mitigations

CVE References

CWE-105 – Struts: Form Field Without Validator

Read Time:52 Second

Description

The application has a form field that is not validated by a corresponding validation form, which can introduce other weaknesses related to insufficient input validation.

Omitting validation for even a single input field may give attackers the leeway they need to compromise the application. Although J2EE applications are not generally susceptible to memory corruption attacks, if a J2EE application interfaces with native code that does not perform array bounds checking, an attacker may be able to use an input validation mistake in the J2EE application to launch a buffer overflow attack.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-1173
CWE-20

 

Consequences

Integrity: Unexpected State

Integrity: Bypass Protection Mechanism

If unused fields are not validated, shared business logic in an action may allow attackers to bypass the validation checks that are performed for other uses of the form.

 

Potential Mitigations

Phase: Implementation

Description: 

Validate all form fields. If a field is unused, it is still important to constrain it so that it is empty or undefined.

CVE References

CWE-1050 – Excessive Platform Resource Consumption within a Loop

Read Time:15 Second

Description

The software has a loop body or loop condition that contains a control element that directly or
indirectly consumes platform resources, e.g. messaging, sessions, locks, or file
descriptors.

Modes of Introduction:

 

 

Related Weaknesses

CWE-405

 

Consequences

Other: Reduce Performance

 

Potential Mitigations

CVE References

CWE-1054 – Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer

Read Time:20 Second

Description

The code at one architectural layer invokes code that resides
at a deeper layer than the adjacent layer, i.e., the invocation skips at least one
layer, and the invoked code is not part of a vertical utility layer that can be referenced from any horizontal layer.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1061

 

Consequences

Other: Reduce Maintainability

 

Potential Mitigations

CVE References