CWE一覧に戻る
CWE-473

PHP外部変数の変更

PHP External Variable Modification
脆弱性 レビュー中
JA

PHP アプリケーションは、クエリパラメータやクッキーのような外部ソースからの 変数の変更に対して適切に保護されていません。このため、そうでなければ存在しないであろう数多くの弱点に アプリケーションがさらされる可能性があります。

EN

A PHP application does not properly protect against the modification of variables from external sources, such as query parameters or cookies. This can expose the application to numerous weaknesses that would not exist otherwise.

Scope: Integrity / Impact: Modify Application Data
Carefully identify which variables can be controlled or influenced by an external user, and consider adopting a naming convention to emphasize when externally modifiable variables are being used. An application should be reluctant to trust variables that have been initialized outside of its trust boundary. Ensure adequate checking is performed when relying on input from outside a trust boundary. Do not allow your application to run with register_globals enabled. If you implement a register_globals emulator, be extremely careful of variable extraction, dynamic evaluation, and similar issues, since weaknesses in your emulation could allow external variable modification to take place even without register_globals.
MITRE公式ページ — CWE-473