CWE-15: External Control of System or Configuration Setting

Export to Word

Description

One or more system settings or configuration elements can be externally controlled by a user.

Extended Description

Allowing external control of system settings can disrupt service or cause an application to behave in unexpected, and potentially malicious ways.


ThreatScore

Threat Mapped score: 0.0

Industry: Finiancial

Threat priority: Unclassified


Observed Examples (CVEs)

Related Attack Patterns (CAPEC)


Attack TTPs

Malware

APTs (Intrusion Sets)

Modes of Introduction

Phase Note
Implementation Setting manipulation vulnerabilities occur when an attacker can control values that govern the behavior of the system, manage specific resources, or in some way affect the functionality of the application.
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.

Common Consequences

Potential Mitigations

Applicable Platforms


Demonstrative Examples

Intro: The following C code accepts a number as one of its command line parameters and sets it as the host ID of the current machine.

Body: Although a process must be privileged to successfully invoke sethostid(), unprivileged users may be able to invoke the program. The code in this example allows user input to directly control the value of a system setting. If an attacker provides a malicious value for host ID, the attacker can misidentify the affected machine on the network or cause other unintended behavior.

... sethostid(argv[1]); ...

Intro: The following Java code snippet reads a string from an HttpServletRequest and sets it as the active catalog for a database Connection.

Body: In this example, an attacker could cause an error by providing a nonexistent catalog name or connect to an unauthorized portion of the database.

... conn.setCatalog(request.getParameter("catalog")); ...

Notes

← Back to CWE list