CWE-610: Externally Controlled Reference to a Resource in Another Sphere

Class Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.

常见后果

影响范围: Confidentiality Integrity

技术影响: Read Application Data Modify Application Data

说明: An adversary could read or modify data, depending on how the resource is intended to be used.

影响范围: Access Control

技术影响: Gain Privileges or Assume Identity

说明: An adversary that can supply a reference to an unintended resource can potentially access a resource that they do not have privileges for, thus bypassing existing access control mechanisms.

观察示例

参考: CVE-2022-3032

An email client does not block loading of remote objects in a nested document.

参考: CVE-2022-45918

Chain: a learning management tool debugger uses external input to locate previous session logs (CWE-73) and does not properly validate the given path (CWE-20), allowing for filesystem path traversal using "../" sequences (CWE-24)

参考: CVE-2018-1000613

Cryptography API uses unsafe reflection when deserializing a private key

参考: CVE-2020-11053

Chain: Go-based Oauth2 reverse proxy can send the authenticated user to another site at the end of the authentication flow. A redirect URL with HTML-encoded whitespace characters can bypass the validation (CWE-1289) to redirect to a malicious site (CWE-601)

参考: CVE-2022-42745

Recruiter software allows reading arbitrary files using XXE

参考: CVE-2004-2331

Database system allows attackers to bypass sandbox restrictions by using the Reflection API.

引入模式

阶段 说明
Architecture and Design COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.
关键信息

CWE ID: CWE-610

抽象级别: Class

结构: Simple

状态: Draft

相关弱点
相关攻击模式
CAPEC-219