CWE-1293: Missing Source Correlation of Multiple Independent Data
To operate successfully, a product sometimes has to implicitly trust the integrity of an information source. When information is implicitly signed, one can ensure that the data was not tampered in transit. This does not ensure that the information source was not compromised when responding to a request. By requesting information from multiple sources, one can check if all of the data is the same. If they are not, the system should report the information sources that respond with a different or minority value as potentially compromised. If there are not enough answers to provide a majority or plurality of responses, the system should report all of the sources as potentially compromised. As the seriousness of the impact of incorrect integrity increases, so should the number of independent information sources that would need to be queried.
Modes of Introduction
Phase | Note |
---|---|
Architecture and Design | This flaw could be introduced during the design of the application or misconfiguration at run time by only specifying a single point of validation. |
Implementation | Such issues could be introduced during hardware implementation, then identified later during Testing or System Configuration phases. |
Operation | This weakness could be introduced by intentionally failing all but one of the devices used to retrieve the data or by failing the devices that validate the data. |
Applicable Platforms
Type | Class | Name | Prevalence |
---|---|---|---|
Language | Not Language-Specific | ||
Operating_system | Not OS-Specific | ||
Architecture | Not Architecture-Specific | ||
Technology | Not Technology-Specific |