Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-749 (暴露危险的方法或函数) — Vulnerability Class 119

119 vulnerabilities classified as CWE-749 (暴露危险的方法或函数). AI Chinese analysis included.

CWE-749 represents a critical architectural flaw where an application exposes a dangerous method or function through its API without adequate access controls. This weakness occurs when developers fail to restrict sensitive operations, allowing external actors to invoke functions that should remain internal or privileged. Attackers typically exploit this by directly calling these unrestricted endpoints to bypass intended security logic, potentially leading to unauthorized data access, privilege escalation, or system compromise. The severity depends on the specific function exposed, ranging from information disclosure to complete system takeover. To mitigate this risk, developers must implement strict authentication and authorization checks on all API endpoints. Additionally, adhering to the principle of least privilege ensures that only necessary methods are exposed, while comprehensive input validation and regular security audits help identify and remediate improperly secured interfaces before they can be weaponized by malicious actors.

MITRE CWE Description
The product provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted. This weakness can lead to a wide variety of resultant weaknesses, depending on the behavior of the exposed method. It can apply to any number of technologies and approaches, such as ActiveX controls, Java functions, IOCTLs, and so on. The exposure can occur in a few different ways: The function/method was never intended to be exposed to outside actors. The function/method was only intended to be accessible to a limited set of actors, such as Internet-based access from a single web site.
Common Consequences (1)
Integrity, Confidentiality, Availability, Access Control, OtherGain Privileges or Assume Identity, Read Application Data, Modify Application Data, Execute Unauthorized Code or Commands, Other
Exposing critical functionality essentially provides an attacker with the privilege level of the exposed functionality. This could result in the modification or exposure of sensitive data or possibly even execution of arbitrary code.
Mitigations (2)
Architecture and DesignIf you must expose a method, make sure to perform input validation on all arguments, limit access to authorized parties, and protect against all possible vulnerabilities.
Architecture and Design, ImplementationIdentify all exposed functionality. Explicitly list all functionality that must be exposed to some user or set of users. Identify which functionality may be: accessible to all users restricted to a small set of privileged users prevented from being directly accessible at all Ensure that the implemented code follows these expectations. This includes setting the appropriate access modifiers where ap…
Examples (2)
In the following Java example the method removeDatabase will delete the database with the name specified in the input parameter.
public void removeDatabase(String databaseName) { try { Statement stmt = conn.createStatement(); stmt.execute("DROP DATABASE " + databaseName); } catch (SQLException ex) {...} }
Bad · Java
private void removeDatabase(String databaseName) { try { Statement stmt = conn.createStatement(); stmt.execute("DROP DATABASE " + databaseName); } catch (SQLException ex) {...} }
Good · Java
These Android and iOS applications intercept URL loading within a WebView and perform special actions if a particular URL scheme is used, thus allowing the Javascript within the WebView to communicate with the application:
// Android @Override public boolean shouldOverrideUrlLoading(WebView view, String url){ if (url.substring(0,14).equalsIgnoreCase("examplescheme:")){ if(url.substring(14,25).equalsIgnoreCase("getUserInfo")){ writeDataToView(view, UserData); return false; } else{ return true; } } }
Bad · Java
// iOS -(BOOL) webView:(UIWebView *)exWebView shouldStartLoadWithRequest:(NSURLRequest *)exRequest navigationType:(UIWebViewNavigationType)exNavigationType { NSURL *URL = [exRequest URL]; if ([[URL scheme] isEqualToString:@"exampleScheme"]) { NSString *functionString = [URL resourceSpecifier]; if ([functionString hasPrefix:@"specialFunction"]) { // Make data available back in webview. UIWebView *webView = [self writeDataToView:[URL query]]; } return NO; } return YES; }
Bad · Objective-C
CVE IDTitleCVSSSeverityPublished
CVE-2023-39495 PDF-XChange Editor readFileIntoStream Exposed Dangerous Function Information Disclosure Vulnerability — PDF-XChange Editor 5.5 -2024-05-03
CVE-2023-39493 PDF-XChange Editor exportAsText Exposed Dangerous Method Remote Code Execution Vulnerability — PDF-XChange Editor 7.8 -2024-05-03
CVE-2023-39468 Triangle MicroWorks SCADA Data Gateway DbasSectorFileToExecuteOnReset Exposed Dangerous Function Remote Code Execution Vulnerability — SCADA Data Gateway 8.8 -2024-05-03
CVE-2023-38124 Inductive Automation Ignition OPC UA Quick Client Task Scheduling Exposed Dangerous Function Remote Code Execution Vulnerability — Ignition 8.8 -2024-05-03
CVE-2023-38101 NETGEAR ProSAFE Network Management System SettingConfigController Exposed Dangerous Function Remote Code Execution Vulnerability — ProSAFE Network Management System 8.8 -2024-05-03
CVE-2023-38097 NETGEAR ProSAFE Network Management System BkreProcessThread Exposed Dangerous Function Remote Code Execution Vulnerability — ProSAFE Network Management System 8.8 -2024-05-03
CVE-2023-37330 Kofax Power PDF exportAsText Exposed Dangerous Method Remote Code Execution Vulnerability — Power PDF 7.8 -2024-05-03
CVE-2023-27365 Foxit PDF Editor DOC File Parsing Exposed Dangerous Method Remote Code Execution Vulnerability — PDF Editor 7.8 -2024-05-03
CVE-2023-27364 Foxit PDF Editor XLS File Parsing Exposed Dangerous Method Remote Code Execution Vulnerability — PDF Editor 7.8 -2024-05-03
CVE-2023-27363 Foxit PDF Reader exportXFAData Exposed Dangerous Method Remote Code Execution Vulnerability — PDF Reader 7.8 -2024-05-03
CVE-2024-27261 IBM Storage Defender - Resiliency Service privilege escalation — Storage Defender 6.4 Medium2024-04-12
CVE-2023-49074 TP-LINK AC1350 安全漏洞 — AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) 7.4 High2024-04-09
CVE-2023-51573 Voltronic Power ViewPower Pro updateManagerPassword Exposed Dangerous Function Authentication Bypass Vulnerability — ViewPower Pro 9.8 -2024-04-01
CVE-2024-29880 JetBrains TeamCity 安全漏洞 — TeamCity 4.2 Medium2024-03-21
CVE-2023-5389 Honeywell UOC 安全漏洞 — ControlEdge UOC 9.1 Critical2024-01-30
CVE-2023-50424 Escalation of Privileges in SAP BTP Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) — github.com/sap/cloud-security-client-go 9.1 Critical2023-12-12
CVE-2023-50423 Escalation of Privileges in SAP BTP Security Services Integration Library ([Python] cloud-pysec) — sap-xssec 9.1 Critical2023-12-12
CVE-2023-50422 Escalation of Privileges in SAP BTP Security Services Integration Library ([Java] cloud-security-services-integration-library) — cloud-security-services-integration-library 9.1 Critical2023-12-12
CVE-2023-49583 Escalation of Privileges in SAP BTP Security Services Integration Library ([Node.js] @sap/xssec) — @sap/xssec 9.1 Critical2023-12-12
CVE-2023-39226 Delta Electronics InfraSuite Device Master Exposed Dangerous Method Or Function — InfraSuite Device Master 9.8 Critical2023-11-30
CVE-2023-40151 Red Lion Controls Sixnet RTU Exposed Dangerous Method Or Function — ST-IPm-8460 10.0 Critical2023-11-21
CVE-2023-42494 EisBaer Scada - CWE-749: Exposed Dangerous Method or Function — v3.0.6433.1964 7.5 High2023-10-25
CVE-2023-3655 Unauthenticated Remote Database Exfiltration — cashIT! - serving solutions. 7.5 High2023-10-03
CVE-2023-3656 Unauthenticated Remote Code Execution — cashIT! - serving solutions. 9.8 Critical2023-10-03
CVE-2023-40150 Softneta MedDream PACS Exposed Dangerous Method or Function — MedDream PACS 9.8 Critical2023-09-11
CVE-2023-3612 Unprotected WebView access in Govee Home App — Govee Home 8.2 High2023-09-11
CVE-2023-39214 Zoom Client 安全漏洞 — Zoom SDK's 7.6 High2023-08-08
CVE-2023-36853 Keysight Geolocation Server Exposed Dangerous Method or Function — N6845A Geolocation Server 7.8 High2023-07-19
CVE-2023-33921 Siemens CP-8031 安全漏洞 — CP-8031 MASTER MODULE 6.8 Medium2023-06-13
CVE-2023-34227 JetBrains TeamCity 安全漏洞 — TeamCity 5.3 Medium2023-05-31

Vulnerabilities classified as CWE-749 (暴露危险的方法或函数) represent 119 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.