Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-15 (系统设置或配置在外部可控制) — Vulnerability Class 55

55 vulnerabilities classified as CWE-15 (系统设置或配置在外部可控制). AI Chinese analysis included.

CWE-15 represents a critical input validation weakness where applications allow users to directly manipulate system settings or configuration parameters. This flaw typically arises when developers trust unverified external inputs, such as environment variables, command-line arguments, or configuration files, without rigorous sanitization. Attackers exploit this vulnerability by injecting malicious values that alter application behavior, leading to service disruption, privilege escalation, or unintended execution paths. To mitigate this risk, developers must implement strict input validation, ensuring that all configuration data originates from trusted sources. Utilizing allowlists for acceptable values, enforcing least-privilege principles, and isolating configuration storage from user-accessible directories are essential practices. By treating all external inputs as untrusted and applying robust verification mechanisms, organizations can prevent adversaries from hijacking system settings and maintain the integrity and stability of their software environments.

MITRE CWE Description
One or more system settings or configuration elements can be externally controlled by a user. Allowing external control of system settings can disrupt service or cause an application to behave in unexpected, and potentially malicious ways.
Common Consequences (1)
OtherVaries by Context
Mitigations (3)
Architecture and DesignCompartmentalize the system to have "safe" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area. Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separatio…
Implementation, Architecture and DesignBecause setting manipulation covers a diverse set of functions, any attempt at illustrating it will inevitably be incomplete. Rather than searching for a tight-knit relationship between the functions addressed in the setting manipulation category, take a step back and consider the sorts of system values that an attacker should not be allowed to control.
Implementation, Architecture and DesignIn general, do not allow user-provided or otherwise untrusted data to control sensitive values. The leverage that an attacker gains by controlling these values is not always immediately obvious, but do not underestimate the creativity of the attacker.
Examples (2)
The following C code accepts a number as one of its command line parameters and sets it as the host ID of the current machine.
... sethostid(argv[1]); ...
Bad · C
The following Java code snippet reads a string from an HttpServletRequest and sets it as the active catalog for a database Connection.
... conn.setCatalog(request.getParameter("catalog")); ...
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2024-39794 WAVLINK AC3000 安全漏洞 — Wavlink AC3000 9.1 Critical2025-01-14
CVE-2024-39793 WAVLINK AC3000 安全漏洞 — Wavlink AC3000 9.1 Critical2025-01-14
CVE-2024-39280 WAVLINK AC3000 安全漏洞 — Wavlink AC3000 9.1 Critical2025-01-14
CVE-2024-39788 WAVLINK AC3000 安全漏洞 — Wavlink AC3000 9.1 Critical2025-01-14
CVE-2024-39789 WAVLINK AC3000 安全漏洞 — Wavlink AC3000 9.1 Critical2025-01-14
CVE-2024-39790 WAVLINK AC3000 安全漏洞 — Wavlink AC3000 9.1 Critical2025-01-14
CVE-2024-54097 Huawei EMUI和Huawei HarmonyOS 安全漏洞 — HarmonyOS 7.3 High2024-12-12
CVE-2024-51544 Service Control — ASPECT-Enterprise 8.2 High2024-12-05
CVE-2024-51543 Information Disclosure — ASPECT-Enterprise 8.2 High2024-12-05
CVE-2024-50358 Advantech EKI-6333AC-2G和Advantech EKI-6333AC-2GD 安全漏洞 — EKI-6333AC-2G 7.2 High2024-11-26
CVE-2024-10979 PostgreSQL PL/Perl environment variable changes execute arbitrary code — PostgreSQL 8.8 High2024-11-14
CVE-2024-21583 Gitpod 安全漏洞 — github.com/gitpod-io/gitpod/components/server/go/pkg/lib 4.1 Medium2024-07-19
CVE-2024-4326 Remote Code Execution via `/apply_settings` and `/execute_code` in parisneo/lollms-webui — parisneo/lollms-webui 9.8AICriticalAI2024-05-16
CVE-2023-6154 Local privilege escalation in Bitdefender Total Security (VA-11168) — Total Security 7.8 High2024-04-01
CVE-2024-23639 micronaut-core management endpoints vulnerable to drive-by localhost attack — micronaut-core 5.1 Medium2024-02-09
CVE-2023-50252 php-svg-lib unsafe attributes merge when parsing `use` tag — php-svg-lib 8.3 High2023-12-12
CVE-2023-46248 Overwrite of builtin Cody commands facilitates RCE — cody 9.1 Critical2023-10-31
CVE-2023-4704 External Control of System or Configuration Setting in instantsoft/icms2 — instantsoft/icms2 9.4 -2023-09-01
CVE-2023-3321 Code Execution through Writable Mosquitto Configuration File — ABB Ability™ zenon 7.0 High2023-07-24
CVE-2023-32349 Teltonika RUT router 安全漏洞 — RUT model routers 8.0 High2023-05-22
CVE-2023-32076 in-toto vulnerable to Configuration Read From Local Directory — in-toto 5.5 Medium2023-05-10
CVE-2021-27406 PerFact OpenVPN-Client — OpenVPN-Client 8.8 High2022-10-14
CVE-2021-38453 AUVESY Versiondog — Versiondog 9.1 Critical2021-10-22
CVE-2021-31338 SINEMA Remote Connect Server 安全漏洞 — SINEMA Remote Connect Client 7.8 -2021-08-19
CVE-2021-3707 D-Link DSL-2750U安全漏洞 — DSL-2750U 7.1 -2021-08-16

Vulnerabilities classified as CWE-15 (系统设置或配置在外部可控制) represent 55 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.