Description
The product uses multiple resources that can have the same identifier, in a context in which unique identifiers are required.
If the product assumes that each resource has a unique identifier, the product could operate on the wrong resource if attackers can cause multiple resources to be associated with the same identifier.
Potential Impact
Access Control
Bypass Protection Mechanism
Other
Quality Degradation
Demonstrative Examples
<form-validation>
<formset>
<form name="ProjectForm"> ... </form>
<form name="ProjectForm"> ... </form>
</formset>
</form-validation>Mitigations & Prevention
Where possible, use unique identifiers. If non-unique identifiers are detected, then do not operate any resource with a non-unique identifier and report the error appropriately.
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2013-4787 | chain: mobile OS verifies cryptographic signature of file in an archive, but then installs a different file with the same name that is also listed in the archive. |
Related Weaknesses
Frequently Asked Questions
What is CWE-694?
CWE-694 (Use of Multiple Resources with Duplicate Identifier) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product uses multiple resources that can have the same identifier, in a context in which unique identifiers are required.
How can CWE-694 be exploited?
Attackers can exploit CWE-694 (Use of Multiple Resources with Duplicate Identifier) to bypass protection mechanism. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-694?
Key mitigations include: Where possible, use unique identifiers. If non-unique identifiers are detected, then do not operate any resource with a non-unique identifier and report the error appropriately.
What is the severity of CWE-694?
CWE-694 is classified as a Base-level weakness (Medium abstraction). It has been observed in 1 real-world CVEs.