13 vulnerabilities classified as CWE-642 (对关键状态数据的外部可控制). AI Chinese analysis included.
CWE-642 represents a critical weakness where security-sensitive state data, such as user privileges or application configuration, is stored in an accessible location vulnerable to unauthorized modification. Attackers typically exploit this flaw by tampering with client-side storage mechanisms, like cookies or local storage, or by intercepting and altering state variables in transit. Since the application assumes this data remains immutable, successful manipulation allows attackers to bypass authentication, escalate privileges, or access restricted resources without detection. To prevent this, developers must ensure that critical state information is never stored on the client side. Instead, all sensitive state should be maintained securely on the server. If client-side storage is necessary for non-critical data, developers should implement robust integrity checks, such as cryptographic signatures, to detect any unauthorized alterations before the application processes the data.
Cookie[] cookies = request.getCookies(); for (int i =0; i< cookies.length; i++) { Cookie c = cookies[i]; if (c.getName().equals("authenticated") && Boolean.TRUE.equals(c.getValue())) { authenticated = true; } }String rName = request.getParameter("reportName"); File rFile = new File("/usr/local/apfr/reports/" + rName); ... rFile.delete();Vulnerabilities classified as CWE-642 (对关键状态数据的外部可控制) represent 13 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.