Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-430:Deployment of Wrong Handler
Weakness ID:430
Version:v4.17
Weakness Name:Deployment of Wrong Handler
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The wrong "handler" is assigned to process an object.

▼Extended Description

An example of deploying the wrong handler would be calling a servlet to reveal source code of a .JSP file, or automatically "determining" type of the object even if it is contradictory to an explicitly specified type.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
CanPrecedeAllowedV433Unparsed Raw Web Content Delivery
ChildOfDiscouragedP691Insufficient Control Flow Management
ParentOfAllowedB434Unrestricted Upload of File with Dangerous Type
Nature: CanPrecede
Mapping: Allowed
Type: Variant
ID: 433
Name: Unparsed Raw Web Content Delivery
Nature: ChildOf
Mapping: Discouraged
Type: Pillar
ID: 691
Name: Insufficient Control Flow Management
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 434
Name: Unrestricted Upload of File with Dangerous Type
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC429Handler Errors
MemberOfProhibitedC977SFP Secondary Cluster: Design
MemberOfProhibitedC1348OWASP Top Ten 2021 Category A04:2021 - Insecure Design
MemberOfProhibitedC1410Comprehensive Categorization: Insufficient Control Flow Management
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 429
Name: Handler Errors
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 977
Name: SFP Secondary Cluster: Design
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1348
Name: OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1410
Name: Comprehensive Categorization: Insufficient Control Flow Management
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-294Not Language-Specific Weaknesses
MemberOfProhibitedBSBOSS-315Unexpected State (impact)
MemberOfProhibitedBSBOSS-326Varies by Context (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-294
Name: Not Language-Specific Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-315
Name: Unexpected State (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-326
Name: Varies by Context (impact)
▼Relevant To View
Relevant to the view"OWASP Top Ten (2021) - (1344)"
NatureMappingTypeIDName
MemberOfProhibitedC1348OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1348
Name: OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC429Handler Errors
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 429
Name: Handler Errors
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC977SFP Secondary Cluster: Design
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 977
Name: SFP Secondary Cluster: Design
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
IntegrityOtherN/AVaries by ContextUnexpected State
N/A
Scope: Integrity, Other
Likelihood: N/A
Impact: Varies by Context, Unexpected State
Note:
N/A
▼Potential Mitigations
Phase:Architecture and Design
Mitigation ID:
Strategy:
Effectiveness:
Description:

Perform a type check before interpreting an object.

Note:


Phase:Architecture and Design
Mitigation ID:
Strategy:
Effectiveness:
Description:

Reject any inconsistent types, such as a file with a .GIF extension that appears to consist of PHP code.

Note:

▼Modes Of Introduction
Phase: Implementation
Note:

N/A

▼Applicable Platforms
Languages
Class: Not Language-Specific(Undetermined Prevalence)
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
CVE-2001-0004
Source code disclosure via manipulated file extension that causes parsing by wrong DLL.
CVE-2002-0025
Web browser does not properly handle the Content-Type header field, causing a different application to process the document.
CVE-2000-1052
Source code disclosure by directly invoking a servlet.
CVE-2002-1742
Arbitrary Perl functions can be loaded by calling a non-existent function that activates a handler.
Reference: CVE-2001-0004
Description:
Source code disclosure via manipulated file extension that causes parsing by wrong DLL.
Reference: CVE-2002-0025
Description:
Web browser does not properly handle the Content-Type header field, causing a different application to process the document.
Reference: CVE-2000-1052
Description:
Source code disclosure by directly invoking a servlet.
Reference: CVE-2002-1742
Description:
Arbitrary Perl functions can be loaded by calling a non-existent function that activates a handler.
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      Resultant
      This weakness is usually resultant from other weaknesses.
      Ordinality: Resultant
      Description:
      This weakness is usually resultant from other weaknesses.
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      PLOVERN/AN/AImproper Handler Deployment
      Taxonomy Name: PLOVER
      Entry ID: N/A
      Fit: N/A
      Entry Name: Improper Handler Deployment
      ▼Related Attack Patterns
      IDName
      CAPEC-11
      Cause Web Server Misclassification
      ID: CAPEC-11
      Name: Cause Web Server Misclassification
      ▼References
      Reference ID: REF-62
      Title: The Art of Software Security Assessment
      Author: Mark Dowd, John McDonald, Justin Schuh
      Section: Chapter 3, "File Handlers", Page 74
      Publication:
      Publisher:Addison Wesley
      Edition:1st Edition
      URL:
      URL Date:
      Day:N/A
      Month:N/A
      Year:2006
      Details not found