The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.
An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit.
Impact: Execute Unauthorized Code or CommandsAlter Execution LogicOther
Executing untrusted code could compromise the control flow of the program. The untrusted code could execute attacker-controlled commands, read or modify sensitive resources, or prevent the software from functioning correctly for legitimate users.
Strategy: Libraries or Frameworks
Strategy: Environment Hardening
Strategy: Sandbox or Jail
Effectiveness: Limited
java//assume the password is already encrypted, avoiding CWE-312*
php
phpMedium