CWE-913 - Improper Control of Dynamically-Managed Code Resources
CWE-913
- Abstraction:
- Class
- Structure:
- Simple
- Status:
- Incomplete
- Weakness Name
Improper Control of Dynamically-Managed Code Resources
- Description
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.
Many languages offer powerful features that allow the programmer to dynamically create or modify existing code, or resources used by code such as variables and objects. While these features can offer significant flexibility and reduce development time, they can be extremely dangerous if attackers can directly influence these code resources in unexpected ways.
- Common Consequences
Scope: Integrity
Impact: Execute Unauthorized Code or Commands
Scope: Other, Integrity
Impact: Varies by Context, Alter Execution Logic
- Related Weaknesses
- Release Date:
- 2013-02-21
- Latest Modification Date:
- 2023-10-26
Free security scan for your website