PHP External Variable Modification |
Weakness ID: 473 (Weakness Variant) | Status: Draft |
Description Summary
Reference | Description |
---|---|
CVE-2000-0860 | File upload allows arbitrary file read by setting hidden form variables to match internal variable names. |
CVE-2001-0854 | Mistakenly trusts $PHP SELF variable to determine if include script was called by its parent. |
CVE-2002-0764 | PHP remote file inclusion by modified assumed-immutable variable. |
CVE-2001-1025 | Modify key variable when calling scripts that don't load a library that initializes it. |
CVE-2003-0754 | Authentication bypass by modifying array used for authentication. |
Carefully identify which variables can be controlled or influenced by an external user, and consider adopting a naming convention to emphasize when externally modifiable variables are being used. An application should be reluctant to trust variables that have been initialized outside of its trust boundary. Ensure adequate checking is performed when relying on input from outside a trust boundary. Do not allow your application to run with register_globals enabled. If you implement a register_globals emulator, be extremely careful of variable extraction, dynamic evaluation, and similar issues, since weaknesses in your emulation could allow external variable modification to take place even without register_globals. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 471 | Modification of Assumed-Immutable Data (MAID) | Development Concepts (primary)699 Research Concepts (primary)1000 |
CanPrecede | ![]() | 98 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP File Inclusion') | Research Concepts1000 |
PeerOf | ![]() | 616 | Incomplete Identification of Uploaded File Variables (PHP) | Research Concepts1000 |
This is a language-specific instance of Modification of Assumed-Immutable Data (MAID). This can be resultant from direct request (alternate path) issues. It can be primary to weaknesses such as PHP file inclusion, SQL injection, XSS, authentication bypass, and others. |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | PHP External Variable Modification |
CAPEC-ID | Attack Pattern Name | (CAPEC Version: 1.4) |
---|---|---|
77 | Manipulating User-Controlled Variables |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Other Notes, Taxonomy Mappings | ||||
2009-12-28 | CWE Content Team | MITRE | Internal | |
updated Other Notes, Relationship Notes |