8 vulnerabilities classified as CWE-650 (在服务器端信任HTTP权限模型). AI Chinese analysis included.
CWE-650 represents a server-side weakness where applications incorrectly assume that HTTP GET requests are safe and idempotent, meaning they should not alter server state. This misconception allows attackers to exploit the vulnerability by crafting malicious GET requests that trigger unintended side effects, such as modifying or deleting critical resources. Since GET requests can be easily embedded in links, images, or automated scripts, adversaries can bypass access controls and execute destructive actions without user interaction or authentication. To prevent this, developers must strictly enforce the principle that GET requests should never perform state-changing operations. Instead, applications should utilize POST, PUT, or DELETE methods for any actions that modify data, ensuring that only explicit, authenticated requests trigger changes to the system’s state.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-56339 | IBM WebSphere Application Server information disclosure — WebSphere Application Server | 3.7 | Low | 2025-08-07 |
| CVE-2025-21120 | Dell Avamar 安全漏洞 — Avamar Server | 8.3 | High | 2025-08-04 |
| CVE-2024-45282 | HTTP Verb Tampering in SAP S/4 HANA(Manage Bank Statements) — SAP S/4 HANA (Manage Bank Statements) | 4.3 | Medium | 2024-10-08 |
| CVE-2024-45097 | IBM Aspera Faspex bypass security — Aspera Faspex | 5.9 | Medium | 2024-09-05 |
| CVE-2024-45098 | IBM Aspera Faspex bypass security — Aspera Faspex | 6.8 | Medium | 2024-09-05 |
| CVE-2024-28787 | IBM Security Verify Access information disclosure — Security Verify Access Container | 8.7 | High | 2024-04-04 |
| CVE-2023-50327 | IBM PowerSC weak security — PowerSC | 5.3 | Medium | 2024-02-02 |
| CVE-2022-38115 | Insecure Methods Vulnerability — SolarWinds SEM | 5.3 | Medium | 2022-11-23 |
Vulnerabilities classified as CWE-650 (在服务器端信任HTTP权限模型) represent 8 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.