Skip to content

CWE-430: Deployment of Wrong Handler

AbstractionStructureStatus
NoneSimpleIncomplete

Description

The wrong “handler” is assigned to process an object.

Extended Description

An example of deploying the wrong handler would be calling a servlet to reveal source code of a .JSP file, or automatically “determining” type of the object even if it is contradictory to an explicitly specified type.

NatureIDView IDName
ChildOfCWE-6911000Insufficient Control Flow Management
CanPrecedeCWE-4331000Unparsed Raw Web Content Delivery
PeerOfCWE-4341000Unrestricted Upload of File with Dangerous Type

Modes of Introduction

PhaseNote
Implementation-

Applicable Platforms

Languages

Class: Not Language-Specific

Technologies

Common Consequences

ScopeImpactNote
Integrity, OtherVaries by Context, Unexpected State

Potential Mitigations

Architecture and Design

Perform a type check before interpreting an object.

Architecture and Design

Reject any inconsistent types, such as a file with a .GIF extension that appears to consist of PHP code.

Observed Examples

  • CVE-2001-0004: Source code disclosure via manipulated file extension that causes parsing by wrong DLL.
  • CVE-2002-0025: Web browser does not properly handle the Content-Type header field, causing a different application to process the document.
  • CVE-2000-1052: Source code disclosure by directly invoking a servlet.
  • CVE-2002-1742: Arbitrary Perl functions can be loaded by calling a non-existent function that activates a handler.