2 vulnerabilities classified as CWE-360 (信任系统事件数据). AI Chinese analysis included.
CWE-360 represents a trust relationship weakness where applications incorrectly rely on unverified system event data for critical security decisions. This vulnerability arises because event messaging systems, such as Windows messages, often lack robust authentication frameworks, allowing any process on a desktop to spoof messages intended for other windows. Attackers typically exploit this by injecting malicious event data to trick applications into performing unauthorized actions, such as elevating privileges or bypassing access controls. To mitigate this risk, developers must implement strict validation mechanisms that verify the source and integrity of incoming events rather than assuming their authenticity. Utilizing authenticated channels, digital signatures, or secure inter-process communication protocols ensures that only trusted entities can trigger sensitive operations, thereby preventing spoofing attacks and maintaining system integrity against malicious actors seeking to manipulate event-driven workflows.
public void actionPerformed(ActionEvent e) { if (e.getSource() == button) { System.out.println("print out secret information"); } }| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-3371 | Insufficient validation of external input in Compass may enable MITM attacks — MongoDB Compass | 7.1 | High | 2024-04-24 |
| CVE-2017-0911 | Twitter Kit for iOS Login with Twitter组件安全漏洞 — Twitter Kit for iOS | 7.1 | - | 2018-02-09 |
Vulnerabilities classified as CWE-360 (信任系统事件数据) represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.