Détail du CWE-698

CWE-698

Execution After Redirect (EAR)
Incomplete
2008-09-09
00h00 +00:00
2023-10-26
00h00 +00:00
Notifications pour un CWE
Restez informé de toutes modifications pour un CWE spécifique.
Gestion des notifications

Nom: Execution After Redirect (EAR)

The web application sends a redirect to another location, but instead of exiting, it executes additional code.

Informations générales

Modes d'introduction

Implementation

Conséquences courantes

Portée Impact Probabilité
Other
Confidentiality
Integrity
Availability
Alter Execution Logic, Execute Unauthorized Code or Commands

Note: This weakness could affect the control flow of the application and allow execution of untrusted code.

Exemples observés

Références Description

CVE-2013-1402

Execution-after-redirect allows access to application configuration details.

CVE-2009-1936

chain: library file sends a redirect if it is directly requested but continues to execute, allowing remote file inclusion and path traversal.

CVE-2007-2713

Remote attackers can obtain access to administrator functionality through EAR.

CVE-2007-4932

Remote attackers can obtain access to administrator functionality through EAR.

CVE-2007-5578

Bypass of authentication step through EAR.

CVE-2007-2713

Chain: Execution after redirect triggers eval injection.

CVE-2007-6652

chain: execution after redirect allows non-administrator to perform static code injection.

Méthodes de détection

Black Box

This issue might not be detected if testing is performed using a web browser, because the browser might obey the redirect and move the user to a different page before the application has produced outputs that indicate something is amiss.

Notes de cartographie des vulnérabilités

Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Commentaire : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

Références

REF-565

Fear the EAR: Discovering and Mitigating Execution After Redirect Vulnerabilities
Adam Doupé, Bryce Boe, Christopher Kruegel, Giovanni Vigna.
http://cs.ucsb.edu/~bboe/public/pubs/fear-the-ear-ccs2011.pdf

Soumission

Nom Organisation Date Date de publication Version
CWE Content Team MITRE 2008-09-09 +00:00 2008-09-09 +00:00 1.0

Modifications

Nom Organisation Date Commentaire
CWE Content Team MITRE 2011-06-01 +00:00 updated Common_Consequences
CWE Content Team MITRE 2012-05-11 +00:00 updated Common_Consequences, Demonstrative_Examples, Relationships
CWE Content Team MITRE 2012-10-30 +00:00 updated Demonstrative_Examples
CWE Content Team MITRE 2013-02-21 +00:00 updated Alternate_Terms, Name, Observed_Examples, References
CWE Content Team MITRE 2014-07-30 +00:00 updated Relationships
CWE Content Team MITRE 2020-02-24 +00:00 updated Relationships
CWE Content Team MITRE 2020-06-25 +00:00 updated Demonstrative_Examples
CWE Content Team MITRE 2022-10-13 +00:00 updated References
CWE Content Team MITRE 2023-04-27 +00:00 updated Relationships
CWE Content Team MITRE 2023-06-29 +00:00 updated Mapping_Notes
CWE Content Team MITRE 2023-10-26 +00:00 updated Demonstrative_Examples