Description
The software does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.
Many languages offer powerful features that allow the programmer to dynamically create or modify existing code, or resources used by code such as variables and objects. While these features can offer significant flexibility and reduce development time, they can be extremely dangerous if attackers can directly influence these code resources in unexpected ways.
Modes of Introduction:
– Architecture and Design
Likelihood of Exploit:
Related Weaknesses
Consequences
Integrity: Execute Unauthorized Code or Commands
Other, Integrity: Varies by Context, Alter Execution Logic
Potential Mitigations
Phase: Implementation
Effectiveness:
Description:
For any externally-influenced input, check the input against an allowlist of acceptable values.
Phase: Implementation, Architecture and Design
Effectiveness:
Description:
Refactor the code so that it does not need to be dynamically managed.
CVE References