Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-623:Unsafe ActiveX Control Marked Safe For Scripting
Weakness ID:623
Version:v4.17
Weakness Name:Unsafe ActiveX Control Marked Safe For Scripting
Vulnerability Mapping:Allowed
Abstraction:Variant
Structure:Simple
Status:Draft
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

An ActiveX control is intended for restricted use, but it has been marked as safe-for-scripting.

▼Extended Description

This might allow attackers to use dangerous functionality via a web page that accesses the control, which can lead to different resultant vulnerabilities, depending on the control's behavior.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
▼Memberships
NatureMappingTypeIDName
▼Tags
NatureMappingTypeIDName
▼Relevant To View
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
ConfidentialityIntegrityAvailabilityN/AExecute Unauthorized Code or Commands
N/A
Scope: Confidentiality, Integrity, Availability
Likelihood: N/A
Impact: Execute Unauthorized Code or Commands
Note:
N/A
▼Potential Mitigations
Phase:Architecture and Design
Mitigation ID:
Strategy:
Effectiveness:
Description:

During development, do not mark it as safe for scripting.

Note:


Phase:System Configuration
Mitigation ID:
Strategy:
Effectiveness:
Description:

After distribution, you can set the kill bit for the control so that it is not accessible from Internet Explorer.

Note:

▼Modes Of Introduction
Phase: Architecture and Design
Note:

N/A

Phase: Implementation
Note:

N/A

▼Applicable Platforms
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
CVE-2007-0617
control allows attackers to add malicious email addresses to bypass spam limits
CVE-2007-0219
web browser uses certain COM objects as ActiveX
CVE-2006-6510
kiosk allows bypass to read files
Reference: CVE-2007-0617
Description:
control allows attackers to add malicious email addresses to bypass spam limits
Reference: CVE-2007-0219
Description:
web browser uses certain COM objects as ActiveX
Reference: CVE-2006-6510
Description:
kiosk allows bypass to read files
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      Primary
      N/A
      Ordinality: Primary
      Description:
      N/A
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      ▼Related Attack Patterns
      IDName
      ▼References
      Reference ID: REF-503
      Title: Developing Secure ActiveX Controls
      Author: Microsoft
      Section:
      Publication:
      Publisher:
      Edition:
      URL:https://learn.microsoft.com/en-us/previous-versions//ms533046(v=vs.85)?redirectedfrom=MSDN
      URL Date:2023-04-07
      Day:13
      Month:04
      Year:2005
      Reference ID: REF-510
      Title: How to stop an ActiveX control from running in Internet Explorer
      Author: Microsoft
      Section:
      Publication:
      Publisher:
      Edition:
      URL:https://support.microsoft.com/en-us/help/240797/how-to-stop-an-activex-control-from-running-in-internet-explorer
      URL Date:2023-04-07
      Day:N/A
      Month:N/A
      Year:N/A
      Reference ID: REF-7
      Title: Writing Secure Code
      Author: Michael Howard, David LeBlanc
      Section: Chapter 16, "What ActiveX Components Are Safe for Initialization and Safe for Scripting?" Page 510
      Publication:
      Publisher:Microsoft Press
      Edition:2nd Edition
      URL:https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223
      URL Date:
      Day:04
      Month:12
      Year:2002
      Reference ID: REF-62
      Title: The Art of Software Security Assessment
      Author: Mark Dowd, John McDonald, Justin Schuh
      Section: Chapter 12, "ActiveX Security", Page 749
      Publication:
      Publisher:Addison Wesley
      Edition:1st Edition
      URL:
      URL Date:
      Day:N/A
      Month:N/A
      Year:2006
      Details not found