Base · Medium

CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control whi...

CWE-915 · Base Level ·18 CVEs ·4 Mitigations

Description

The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.

If the object contains attributes that were only intended for internal use, then their unexpected modification could lead to a vulnerability. This weakness is sometimes known by the language-specific mechanisms that make it possible, such as mass assignment, autobinding, or object injection.

Potential Impact

Integrity

Modify Application Data

Integrity

Execute Unauthorized Code or Commands

Other, Integrity

Varies by Context, Alter Execution Logic

Demonstrative Examples

This function sets object attributes based on a dot-separated path.
Bad
function setValueByPath (object, path, value) {
	       
		 const pathArray = path.split(".");
		 const attributeToSet = pathArray.pop();
		 let objectToModify = object;
		 for (const attr of pathArray) {
		 if (typeof objectToModify[attr] !== 'object') {
		 objectToModify[attr] = {};
		 }
		 objectToModify = objectToModify[attr];
		 }
		 objectToModify[attributeToSet] = value;
		 return object;
		 }
This function does not check if the attribute resolves to the object prototype. These codes can be used to add "isAdmin: true" to the object prototype.
Bad
setValueByPath({}, "__proto__.isAdmin", true)
		 setValueByPath({}, "constructor.prototype.isAdmin", true)
By using a denylist of dangerous attributes, this weakness can be eliminated.
Good
function setValueByPath (object, path, value) {
		 
		   const pathArray = path.split(".");
		   const attributeToSet = pathArray.pop();
		   let objectToModify = object;
		   for (const attr of pathArray) {
		   
		     // Ignore attributes which resolve to object prototype
		     if (attr === "__proto__" || attr === "constructor" || attr === "prototype") {
		     
		       continue;
		       }
		     
		     if (typeof objectToModify[attr] !== "object") {
		     
		       objectToModify[attr] = {};
		       }
		     
		     objectToModify = objectToModify[attr];
		     }
		   
		   objectToModify[attributeToSet] = value;
		   return object;
		   }

Mitigations & Prevention

Implementation

If available, use features of the language or framework that allow specification of allowlists of attributes or fields that are allowed to be modified. If possible, prefer allowlists over denylists. For applications written with Ruby on Rails, use the attr_accessible (allowlist) or attr_protected (denylist) macros in each class that may be used in mass assignment.

Architecture and DesignImplementation

If available, use the signing/sealing features of the programming language to assure that deserialized data has not been tainted. For example, a hash-based message authentication code (HMAC) could be used to ensure that data has not been modified.

Implementation

For any externally-influenced input, check the input against an allowlist of internal object attributes or fields that are allowed to be modified.

ImplementationArchitecture and Design

Refactor the code so that object attributes or fields do not need to be dynamically identified, and only expose getter/setter functionality for the intended attributes.

Detection Methods

  • Automated Static Analysis High — Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then sea

Real-World CVE Examples

CVE IDDescription
CVE-2024-3283Application for using LLMs allows modification of a sensitive variable using mass assignment.
CVE-2012-2054Mass assignment allows modification of arbitrary attributes using modified URL.
CVE-2012-2055Source version control product allows modification of trusted key using mass assignment.
CVE-2008-7310Attackers can bypass payment step in e-commerce product.
CVE-2013-1465Use of PHP unserialize function on untrusted input allows attacker to modify application configuration.
CVE-2012-3527Use of PHP unserialize function on untrusted input in content management system might allow code execution.
CVE-2012-0911Use of PHP unserialize function on untrusted input in content management system allows code execution using a crafted cookie value.
CVE-2012-0911Content management system written in PHP allows unserialize of arbitrary objects, possibly allowing code execution.
CVE-2011-4962Content management system written in PHP allows code execution through page comments.
CVE-2009-4137Use of PHP unserialize function on cookie value allows remote code execution or upload of arbitrary files.
CVE-2007-5741Content management system written in Python interprets untrusted data as pickles, allowing code execution.
CVE-2011-2520Python script allows local users to execute code via pickled data.
CVE-2005-2875Python script allows remote attackers to execute arbitrary code using pickled objects.
CVE-2013-0277Ruby on Rails allows deserialization of untrusted YAML to execute arbitrary code.
CVE-2011-2894Spring framework allows deserialization of objects from untrusted sources to execute arbitrary code.

Showing 15 of 18 observed examples.

Frequently Asked Questions

What is CWE-915?

CWE-915 (Improperly Controlled Modification of Dynamically-Determined Object Attributes) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control whi...

How can CWE-915 be exploited?

Attackers can exploit CWE-915 (Improperly Controlled Modification of Dynamically-Determined Object Attributes) to modify application data. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.

How do I prevent CWE-915?

Key mitigations include: If available, use features of the language or framework that allow specification of allowlists of attributes or fields that are allowed to be modified. If possible, prefer allowlists over denylists.

What is the severity of CWE-915?

CWE-915 is classified as a Base-level weakness (Medium abstraction). It has been observed in 18 real-world CVEs.