Modes Of Introduction
Architecture and Design
Implementation
Applicable Platforms
Language
Name: PHP (Sometimes)
Class: Not Language-Specific (Undetermined)
Common Consequences
Scope |
Impact |
Likelihood |
Integrity | Modify Application Data
Note: An attacker could gain access to and modify sensitive data or system information. | |
Observed Examples
References |
Description |
| WordPress module sets internal variables based on external inputs, allowing false reporting of the number of views |
| Does not clear dangerous environment variables, enabling symlink attack. |
| Specify alternate configuration directory in environment variable, enabling untrusted path. |
| Dangerous environment variable not cleansed. |
| Specify arbitrary modules using environment variable. |
Potential Mitigations
Phases : Implementation
A product system should be reluctant to trust variables that have been initialized outside of its trust boundary. Ensure adequate checking (e.g. input validation) is performed when relying on input from outside a trust boundary.
Phases : Architecture and Design
Avoid any external control of variables. If necessary, restrict the variables that can be modified using an allowlist, and use a different namespace or naming convention if possible.
Vulnerability Mapping Notes
Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Comment : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
NotesNotes
Overlaps Missing variable initialization, especially in PHP.
This is often found in PHP due to register_globals and the common practice of storing library/include files under the web document root so that they are available using a direct request.
Submission
Name |
Organization |
Date |
Date release |
Version |
PLOVER |
|
2006-07-19 +00:00 |
2006-07-19 +00:00 |
Draft 3 |
Modifications
Name |
Organization |
Date |
Comment |
Sean Eidemiller |
Cigital |
2008-07-01 +00:00 |
added/updated demonstrative examples |
Eric Dalci |
Cigital |
2008-07-01 +00:00 |
updated Potential_Mitigations, Time_of_Introduction |
CWE Content Team |
MITRE |
2008-09-08 +00:00 |
updated Applicable_Platforms, Description, Relationships, Other_Notes, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2009-10-29 +00:00 |
updated Other_Notes, Relationship_Notes |
CWE Content Team |
MITRE |
2010-02-16 +00:00 |
updated Description, Name, Relationships |
CWE Content Team |
MITRE |
2010-04-05 +00:00 |
updated Applicable_Platforms, Demonstrative_Examples |
CWE Content Team |
MITRE |
2011-03-29 +00:00 |
updated Demonstrative_Examples |
CWE Content Team |
MITRE |
2011-06-01 +00:00 |
updated Common_Consequences, Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2012-05-11 +00:00 |
updated Common_Consequences, Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2012-10-30 +00:00 |
updated Potential_Mitigations |
CWE Content Team |
MITRE |
2014-07-30 +00:00 |
updated Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Description |
CWE Content Team |
MITRE |
2020-06-25 +00:00 |
updated Potential_Mitigations |
CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description, Potential_Mitigations |
CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
CWE Content Team |
MITRE |
2023-10-26 +00:00 |
updated Observed_Examples, Relationships |