CWE一覧に戻る
CWE-114

プロセス制御

Process Control
脆弱性 作成中
JA

信頼できないソースから、あるいは信頼できない環境でコマンドを実行したりライブラリをロードしたりすると、攻撃者に代わってアプリケーションが悪意のあるコマンド(およびペイロード)を実行する可能性があります。

プロセス制御の脆弱性には2つの形態がある:

EN

Executing commands or loading libraries from an untrusted source or in an untrusted environment can cause an application to execute malicious commands (and payloads) on behalf of an attacker.

Process control vulnerabilities take two forms:

Scope: Confidentiality, Integrity, Availability / Impact: Execute Unauthorized Code or Commands
Libraries that are loaded should be well understood and come from a trusted source. The application can execute code contained in the native libraries, which often contain calls that are susceptible to other security problems, such as buffer overflows or command injection. All native libraries should be validated to determine if the application requires the use of the library. It is very difficult to determine what these native libraries actually do, and the potential for malicious code is high. In addition, the potential for an inadvertent mistake in these native libraries is also high, as many are written in C or C++ and may be susceptible to buffer overflow or race condition problems. To help prevent buffer overflow attacks, validate all input to native calls for content and length. If the native library does not come from a trusted source, review the source code of the library. The library should be built from the reviewed source before using it.
MITRE公式ページ — CWE-114