Description
The product sends non-cloned mutable data as an argument to a method or function.
The function or method that has been called can alter or delete the mutable data. This could violate assumptions that the calling function has made about its state. In situations where unknown code is called with references to mutable data, this external code could make changes to the data sent. If this data was not previously cloned, the modified data might not be valid in the context of execution.
Potential Impact
Integrity
Modify Memory
Demonstrative Examples
private:int foo;complexType bar;String baz;otherClass externalClass;
public:void doStuff() {externalClass.doOtherStuff(foo, bar, baz)}public class BookStore {
private BookStoreInventory inventory;private SalesDBManager sales;...
// constructor for BookStore
public BookStore() {this.inventory = new BookStoreInventory();this.sales = new SalesDBManager();...}public void updateSalesAndInventoryForBookSold(String bookISBN) {
// Get book object from inventory using ISBN
Book book = inventory.getBookWithISBN(bookISBN);
// update sales information for book sold
sales.updateSalesInformation(book);
// update inventory
inventory.updateInventory(book);
}
// other BookStore methods
...
}public class Book {private String title;private String author;private String isbn;
// Book object constructors and get/set methods
...}...public void updateSalesAndInventoryForBookSold(String bookISBN) {
// Get book object from inventory using ISBN
Book book = inventory.getBookWithISBN(bookISBN);
// Create copy of book object to make sure contents are not changed
Book bookSold = (Book) book.clone();
// update sales information for book sold
sales.updateSalesInformation(bookSold);
// update inventory
inventory.updateInventory(book);
}...Mitigations & Prevention
Pass in data which should not be altered as constant or immutable.
Clone all mutable data before passing it into an external function . This is the preferred mitigation. This way, regardless of what changes are made to the data, a valid copy is retained for use by the class.
Related Weaknesses
Taxonomy Mappings
- CLASP: — Passing mutable objects to an untrusted method
- The CERT Oracle Secure Coding Standard for Java (2011): OBJ04-J — Provide mutable classes with copy functionality to safely allow passing instances to untrusted code
- Software Fault Patterns: SFP23 — Exposed Data
Frequently Asked Questions
What is CWE-374?
CWE-374 (Passing Mutable Objects to an Untrusted Method) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product sends non-cloned mutable data as an argument to a method or function.
How can CWE-374 be exploited?
Attackers can exploit CWE-374 (Passing Mutable Objects to an Untrusted Method) to modify memory. This weakness is typically introduced during the Implementation phase of software development.
How do I prevent CWE-374?
Key mitigations include: Pass in data which should not be altered as constant or immutable.
What is the severity of CWE-374?
CWE-374 is classified as a Base-level weakness (Medium abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.