Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-1046:Creation of Immutable Text Using String Concatenation
Weakness ID:1046
Version:v4.17
Weakness Name:Creation of Immutable Text Using String Concatenation
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product creates an immutable text string using string concatenation operations.

▼Extended Description

When building a string via a looping feature (e.g., a FOR or WHILE loop), the use of += to append to the existing string will result in the creation of a new object with each iteration. This programming pattern can be inefficient in comparison with use of text buffer data elements. This issue can make the product perform more slowly. If the relevant code is reachable by an attacker, then this could be influenced to create performance problem.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfAllowed-with-ReviewC1176Inefficient CPU Computation
Nature: ChildOf
Mapping: Allowed-with-Review
Type: Class
ID: 1176
Name: Inefficient CPU Computation
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC1006Bad Coding Practices
MemberOfProhibitedC1132CISQ Quality Measures (2016) - Performance Efficiency
MemberOfProhibitedC1309CISQ Quality Measures - Efficiency
MemberOfProhibitedC1416Comprehensive Categorization: Resource Lifecycle Management
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1006
Name: Bad Coding Practices
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1132
Name: CISQ Quality Measures (2016) - Performance Efficiency
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1309
Name: CISQ Quality Measures - Efficiency
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1416
Name: Comprehensive Categorization: Resource Lifecycle Management
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-313Reduce Performance (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-313
Name: Reduce Performance (impact)
▼Relevant To View
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC1006Bad Coding Practices
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1006
Name: Bad Coding Practices
Relevant to the view"CISQ Quality Measures (2020) - (1305)"
NatureMappingTypeIDName
MemberOfProhibitedC1309CISQ Quality Measures - Efficiency
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1309
Name: CISQ Quality Measures - Efficiency
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
OtherN/AReduce Performance
N/A
Scope: Other
Likelihood: N/A
Impact: Reduce Performance
Note:
N/A
▼Potential Mitigations
▼Modes Of Introduction
▼Applicable Platforms
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      Indirect
      N/A
      Ordinality: Indirect
      Description:
      N/A
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      OMG ASCPEMASCPEM-PRF-2N/AN/A
      Taxonomy Name: OMG ASCPEM
      Entry ID: ASCPEM-PRF-2
      Fit: N/A
      Entry Name: N/A
      ▼Related Attack Patterns
      IDName
      ▼References
      Reference ID: REF-959
      Title: Automated Source Code Performance Efficiency Measure (ASCPEM)
      Author: Object Management Group (OMG)
      Section: ASCPEM-PRF-2
      Publication:
      Publisher:
      Edition:
      URL:https://www.omg.org/spec/ASCPEM/
      URL Date:2023-04-07
      Day:N/A
      Month:01
      Year:2016
      Details not found