Scope | Impact | Likelihood |
---|---|---|
Other Confidentiality Integrity Availability | Alter Execution Logic, Execute Unauthorized Code or Commands Note: This weakness could affect the control flow of the application and allow execution of untrusted code. |
References | Description |
---|---|
CVE-2013-1402 | Execution-after-redirect allows access to application configuration details. |
CVE-2009-1936 | chain: library file sends a redirect if it is directly requested but continues to execute, allowing remote file inclusion and path traversal. |
CVE-2007-2713 | Remote attackers can obtain access to administrator functionality through EAR. |
CVE-2007-4932 | Remote attackers can obtain access to administrator functionality through EAR. |
CVE-2007-5578 | Bypass of authentication step through EAR. |
CVE-2007-2713 | Chain: Execution after redirect triggers eval injection. |
CVE-2007-6652 | chain: execution after redirect allows non-administrator to perform static code injection. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
CWE Content Team | MITRE | 1.0 |
Name | Organization | Date | Comment |
---|---|---|---|
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Common_Consequences, Demonstrative_Examples, Relationships | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
CWE Content Team | MITRE | updated Alternate_Terms, Name, Observed_Examples, References | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
CWE Content Team | MITRE | updated References | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes | |
CWE Content Team | MITRE | updated Demonstrative_Examples |