The wrong "handler" is assigned to process an object.
An example of deploying the wrong handler would be calling a servlet to reveal source code of a .JSP file, or automatically "determining" type of the object even if it is contradictory to an explicitly specified type.
Threat Mapped score: 1.8
Industry: Finiancial
Threat priority: P4 - Informational (Low)
CVE: CVE-2001-0004
Source code disclosure via manipulated file extension that causes parsing by wrong DLL.
CVE: CVE-2002-0025
Web browser does not properly handle the Content-Type header field, causing a different application to process the document.
CVE: CVE-2000-1052
Source code disclosure by directly invoking a servlet.
CVE: CVE-2002-1742
Arbitrary Perl functions can be loaded by calling a non-existent function that activates a handler.
Phase | Note |
---|---|
Implementation | N/A |
N/A