CWE-471: Modification of Assumed-Immutable Data (MAID)

Export to Word

Description

The product does not properly protect an assumed-immutable element from being modified by an attacker.

Extended Description

This occurs when a particular input is critical enough to the functioning of the application that it should not be modifiable at all, but it is. Certain resources are often assumed to be immutable when they are not, such as hidden form fields in web applications, cookies, and reverse DNS lookups.


ThreatScore

Threat Mapped score: 1.8

Industry: Finiancial

Threat priority: P4 - Informational (Low)


Observed Examples (CVEs)

Related Attack Patterns (CAPEC)


Attack TTPs

N/A

Modes of Introduction

Phase Note
Implementation N/A
Architecture and Design N/A

Common Consequences

Potential Mitigations

Applicable Platforms


Demonstrative Examples

Intro: In the code excerpt below, an array returned by a Java method is modified despite the fact that arrays are mutable.

String[] colors = car.getAllPossibleColors(); colors[0] = "Red";

Notes

← Back to CWE list