Function Call With Incorrect Order of Arguments |
Weakness ID: 683 (Weakness Variant) | Status: Draft |
Description Summary
Extended Description
While this weakness might be caught by the compiler in some languages, it can occur more frequently in cases in which the called function accepts variable numbers or types of arguments, such as format strings in C. It also can occur in languages or environments that do not enforce strong typing.
This problem typically occurs when the programmer makes a typo, or copy and paste errors. |
Example 1
The following PHP method authenticates a user given a username/password combination but is called with the parameters in reverse order.
Reference | Description |
---|---|
CVE-2006-7049 | Application calls functions with arguments in the wrong order, allowing attacker to bypass intended access restrictions. |
Use the function, procedure, or routine as specified. |
Because this function call often produces incorrect behavior it will usually be detected during testing or normal operation of the software. During testing exercise all possible control paths will typically expose this weakness except in rare cases when the incorrect function call accidentally produces the correct results or if the provided argument type is very similar to the expected argument type. |
Ordinality | Description |
---|---|
Primary | (where the weakness exists independent of other weaknesses) |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 628 | Function Call with Incorrectly Specified Arguments | Development Concepts (primary)699 Research Concepts (primary)1000 |
Modifications | ||||
---|---|---|---|---|
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Sean Eidemiller | Cigital | External | |
added/updated demonstrative examples | ||||
2008-07-01 | Eric Dalci | Cigital | External | |
updated Potential Mitigations | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Description, Relationships, Other Notes, Weakness Ordinalities | ||||
2009-05-27 | CWE Content Team | MITRE | Internal | |
updated Demonstrative Examples | ||||
2009-10-29 | CWE Content Team | MITRE | Internal | |
updated Modes of Introduction, Other Notes, Potential Mitigations |