Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-650 (在服务器端信任HTTP权限模型) — Vulnerability Class 8

8 vulnerabilities classified as CWE-650 (在服务器端信任HTTP权限模型). AI Chinese analysis included.

CWE-650 represents a server-side weakness where applications incorrectly assume that HTTP GET requests are safe and idempotent, meaning they should not alter server state. This misconception allows attackers to exploit the vulnerability by crafting malicious GET requests that trigger unintended side effects, such as modifying or deleting critical resources. Since GET requests can be easily embedded in links, images, or automated scripts, adversaries can bypass access controls and execute destructive actions without user interaction or authentication. To prevent this, developers must strictly enforce the principle that GET requests should never perform state-changing operations. Instead, applications should utilize POST, PUT, or DELETE methods for any actions that modify data, ensuring that only explicit, authenticated requests trigger changes to the system’s state.

MITRE CWE Description
The server contains a protection mechanism that assumes that any URI that is accessed using HTTP GET will not cause a state change to the associated resource. This might allow attackers to bypass intended access restrictions and conduct resource modification and deletion attacks, since some applications allow GET to modify state. The HTTP GET method and some other methods are designed to retrieve resources and not to alter the state of the application or resources on the server side. Furthermore, the HTTP specification requires that GET requests (and other requests) should not have side effects. Believing that it will be enough to prevent unintended resource alterations, an application may disallow the HTTP requests to perform DELETE, PUT and POST operations on the resource representation. However, there is nothing in the HTTP protocol itself that actually prevents the HTTP GET method from performing more than just query of the data. Developers can easily code programs that accept a HTTP GET request that do in fact create, update or delete data on the server. For instance, it is a common practice with REST based Web Services to have HTTP GET requests modifying resources on the server side. However, whenever that happens, the access control needs to be properly enforced in the application. No assumptions should be made that only HTTP DELETE, PUT, POST, and other methods have the power to alter the representation of the resource being accessed in the request.
Common Consequences (3)
Access ControlGain Privileges or Assume Identity
An attacker could escalate privileges.
IntegrityModify Application Data
An attacker could modify resources.
ConfidentialityRead Application Data
An attacker could obtain sensitive information.
Mitigations (1)
System ConfigurationConfigure ACLs on the server side to ensure that proper level of access control is defined for each accessible resource representation.
CVE IDTitleCVSSSeverityPublished
CVE-2024-56339 IBM WebSphere Application Server information disclosure — WebSphere Application Server 3.7 Low2025-08-07
CVE-2025-21120 Dell Avamar 安全漏洞 — Avamar Server 8.3 High2025-08-04
CVE-2024-45282 HTTP Verb Tampering in SAP S/4 HANA(Manage Bank Statements) — SAP S/4 HANA (Manage Bank Statements) 4.3 Medium2024-10-08
CVE-2024-45097 IBM Aspera Faspex bypass security — Aspera Faspex 5.9 Medium2024-09-05
CVE-2024-45098 IBM Aspera Faspex bypass security — Aspera Faspex 6.8 Medium2024-09-05
CVE-2024-28787 IBM Security Verify Access information disclosure — Security Verify Access Container 8.7 High2024-04-04
CVE-2023-50327 IBM PowerSC weak security — PowerSC 5.3 Medium2024-02-02
CVE-2022-38115 Insecure Methods Vulnerability — SolarWinds SEM 5.3 Medium2022-11-23

Vulnerabilities classified as CWE-650 (在服务器端信任HTTP权限模型) represent 8 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.