 
    
结构: Simple
Abstraction: Base
状态: Incomplete
被利用可能性: unkown
The wrong "handler" is assigned to process an object.
An example of deploying the wrong handler would be calling a servlet to reveal source code of a .JSP file, or automatically "determining" type of the object even if it is contradictory to an explicitly specified type.
cwe_Nature: ChildOf cwe_CWE_ID: 691 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: CanPrecede cwe_CWE_ID: 433 cwe_View_ID: 1000
cwe_Nature: PeerOf cwe_CWE_ID: 434 cwe_View_ID: 1000
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
| 范围 | 影响 | 注释 | 
|---|---|---|
| ['Integrity', 'Other'] | ['Varies by Context', 'Unexpected State'] | 
策略:
Perform a type check before interpreting an object.
策略:
Reject any inconsistent types, such as a file with a .GIF extension that appears to consist of PHP code.
| 标识 | 说明 | 链接 | 
|---|---|---|
| CVE-2001-0004 | Source code disclosure via manipulated file extension that causes parsing by wrong DLL. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0004 | 
| CVE-2002-0025 | Web browser does not properly handle the Content-Type header field, causing a different application to process the document. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0025 | 
| CVE-2000-1052 | Source code disclosure by directly invoking a servlet. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1052 | 
| CVE-2002-1742 | Arbitrary Perl functions can be loaded by calling a non-existent function that activates a handler. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1742 | 
| 映射的分类名 | ImNode ID | Fit | Mapped Node Name | 
|---|---|---|---|
| PLOVER | Improper Handler Deployment |