2011 Top 25 - Insecure Interaction Between Components
A category in the Common Weakness Enumeration published by The MITRE Corporation.
Summary
Categories in the Common Weakness Enumeration (CWE) group entries based on some common characteristic or attribute.
Weaknesses in this category are listed in the "Insecure Interaction Between Components" section of the 2011 CWE/SANS Top 25 Most Dangerous Software Errors.
Weaknesses
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated...
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes...
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralize...
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Concepts
Deprecated or Obsolete
CWE entries in this view (graph) are listed in the 2011 CWE/SANS Top 25 Most Dangerous Software Errors.
See Also
Common Weakness Enumeration content on this website is copyright of The MITRE Corporation unless otherwise specified. Use of the Common Weakness Enumeration and the associated references on this website are subject to the Terms of Use as specified by The MITRE Corporation.