CWE-434: Unrestricted Upload of File with Dangerous Type
low-riskThe product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Common Consequences
Detection Methods
According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Web Application Scanner Web Services Scanner Database Scanners
According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Fuzz Tester Framework-based Fuzzer
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Focused Manual Spotcheck - Focused manual analysis of source Manual Source Code Review (not inspections)
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Source code Weakness Analyzer Context-configured Source Code Weakness Analyzer
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Formal Methods / Correct-By-Construction Cost effective for partial coverage: Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2018-15961 | 9.8 | 94.4% | Y |
| CVE-2018-15961 | 9.8 | 94.4% | Y |
| CVE-2020-25213 | 10.0 | 94.4% | Y |
| CVE-2020-25213 | 10.0 | 94.4% | Y |
| CVE-2017-12617 | 8.1 | 94.4% | Y |
| CVE-2017-12617 | 8.1 | 94.4% | Y |
| CVE-2016-3088 | 9.8 | 94.3% | Y |
| CVE-2016-3088 | 9.8 | 94.3% | Y |
| CVE-2020-24186 | 10.0 | 94.2% | — |
| CVE-2017-12615 | 8.1 | 94.2% | Y |