CWE-349

Acceptance of Extraneous Untrusted Data With Trusted Data

Weakness Description

The product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.

Common Consequences

Access ControlIntegrity
Bypass Protection MechanismModify Application Data

An attacker could package untrusted data with trusted data to bypass protection mechanisms to gain access to and possibly modify sensitive data.

Advertisement

Related Weaknesses