CWE-15: External Control of System or Configuration Setting

Base Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

One or more system settings or configuration elements can be externally controlled by a user.

扩展描述

Allowing external control of system settings can disrupt service or cause an application to behave in unexpected, and potentially malicious ways.

常见后果

影响范围: Other

技术影响: Varies by Context

潜在缓解措施

阶段: Architecture and Design

策略: Separation of Privilege

阶段: Implementation Architecture and Design

描述: Because setting manipulation covers a diverse set of functions, any attempt at illustrating it will inevitably be incomplete. Rather than searching for a tight-knit relationship between the functions addressed in the setting manipulation category, take a step back and consider the sorts of system values that an attacker should not be allowed to control.

阶段: Implementation Architecture and Design

描述: In general, do not allow user-provided or otherwise untrusted data to control sensitive values. The leverage that an attacker gains by controlling these values is not always immediately obvious, but do not underestimate the creativity of the attacker.

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

引入模式

阶段 说明
Implementation Setting manipulation vulnerabilities occur when an attacker can control values that govern the behavior of the system, manage specific resources, or in some way affect the functionality of the application.
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.

适用平台

技术
Not Technology-Specific (Undetermined) ICS/OT (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
7 Pernicious Kingdoms - Setting Manipulation -
Software Fault Patterns SFP25 Tainted input to variable -
关键信息

CWE ID: CWE-15

抽象级别: Base

结构: Simple

状态: Incomplete

相关弱点
相关攻击模式
CAPEC-13 CAPEC-146 CAPEC-176 CAPEC-203 CAPEC-270 CAPEC-271 CAPEC-579 CAPEC-69 CAPEC-76 CAPEC-77