Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-694 (使用多个具有重复标识的资源) — Vulnerability Class 8

8 vulnerabilities classified as CWE-694 (使用多个具有重复标识的资源). AI Chinese analysis included.

CWE-694 represents a resource management weakness where a system incorrectly assigns or handles duplicate identifiers for distinct resources in contexts demanding uniqueness. This flaw typically arises when developers fail to enforce strict identity constraints, allowing attackers to manipulate input or exploit race conditions to associate multiple resources with a single identifier. Consequently, the application may operate on the wrong resource, leading to data corruption, unauthorized access, or denial of service as the system misinterprets the intended target. To prevent this, developers must implement robust validation mechanisms that guarantee identifier uniqueness across all relevant scopes. Utilizing cryptographic hashing, database constraints, or unique key generation algorithms ensures that each resource maintains a distinct identity. Additionally, rigorous input sanitization and thorough testing for collision scenarios are essential to mitigate the risk of identifier reuse and maintain system integrity.

MITRE CWE Description
The product uses multiple resources that can have the same identifier, in a context in which unique identifiers are required. If the product assumes that each resource has a unique identifier, the product could operate on the wrong resource if attackers can cause multiple resources to be associated with the same identifier.
Common Consequences (2)
Access ControlBypass Protection Mechanism
If unique identifiers are assumed when protecting sensitive resources, then duplicate identifiers might allow attackers to bypass the protection.
OtherQuality Degradation
Mitigations (1)
Architecture and DesignWhere possible, use unique identifiers. If non-unique identifiers are detected, then do not operate any resource with a non-unique identifier and report the error appropriately.
Examples (1)
These two Struts validation forms have the same name.
<form-validation> <formset> <form name="ProjectForm"> ... </form> <form name="ProjectForm"> ... </form> </formset> </form-validation>
Bad · XML

Vulnerabilities classified as CWE-694 (使用多个具有重复标识的资源) represent 8 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.