If the object contains attributes that were only intended for internal use, then their unexpected modification could lead to a vulnerability.
This weakness is sometimes known by the language-specific mechanisms that make it possible, such as mass assignment, autobinding, or object injection.
Scope | Impact | Likelihood |
---|---|---|
Integrity | Modify Application Data Note: An attacker could modify sensitive data or program variables. | |
Integrity | Execute Unauthorized Code or Commands | |
Other Integrity | Varies by Context, Alter Execution Logic |
References | Description |
---|---|
CVE-2024-3283 | Application for using LLMs allows modification of a sensitive variable using mass assignment. |
CVE-2012-2054 | Mass assignment allows modification of arbitrary attributes using modified URL. |
CVE-2012-2055 | Source version control product allows modification of trusted key using mass assignment. |
CVE-2008-7310 | Attackers can bypass payment step in e-commerce product. |
CVE-2013-1465 | Use of PHP unserialize function on untrusted input allows attacker to modify application configuration. |
CVE-2012-3527 | Use of PHP unserialize function on untrusted input in content management system might allow code execution. |
CVE-2012-0911 | Use of PHP unserialize function on untrusted input in content management system allows code execution using a crafted cookie value. |
CVE-2012-0911 | Content management system written in PHP allows unserialize of arbitrary objects, possibly allowing code execution. |
CVE-2011-4962 | Content management system written in PHP allows code execution through page comments. |
CVE-2009-4137 | Use of PHP unserialize function on cookie value allows remote code execution or upload of arbitrary files. |
CVE-2007-5741 | Content management system written in Python interprets untrusted data as pickles, allowing code execution. |
CVE-2011-2520 | Python script allows local users to execute code via pickled data. |
CVE-2005-2875 | Python script allows remote attackers to execute arbitrary code using pickled objects. |
CVE-2013-0277 | Ruby on Rails allows deserialization of untrusted YAML to execute arbitrary code. |
CVE-2011-2894 | Spring framework allows deserialization of objects from untrusted sources to execute arbitrary code. |
CVE-2012-1833 | Grails allows binding of arbitrary parameters to modify arbitrary object properties. |
CVE-2010-3258 | Incorrect deserialization in web browser allows escaping the sandbox. |
CVE-2008-1013 | Media library allows deserialization of objects by untrusted Java applets, leading to arbitrary code execution. |
If available, use features of the language or framework that allow specification of allowlists of attributes or fields that are allowed to be modified. If possible, prefer allowlists over denylists.
For applications written with Ruby on Rails, use the attr_accessible (allowlist) or attr_protected (denylist) macros in each class that may be used in mass assignment.
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
CWE Content Team | MITRE | 2.4 |
Name | Organization | Date | Comment |
---|---|---|---|
CWE Content Team | MITRE | updated References | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated References | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Alternate_Terms, Potential_Mitigations | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Description, Observed_Examples | |
CWE Content Team | MITRE | updated Detection_Factors, References, Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
CWE Content Team | MITRE | updated Observed_Examples |