Python : Undocumented feature: hidden functionality

Classification

OWASP ASVS Malicious Code PCI DSS 4.0 2.2.4 CWE CWE-506 CWE-912

Overview

The application executes the code obtained from the string after decoding (e.g, base64). Authors of backdoors use this technique to make it difficult to detect the code that implements the undocumented functionality.

From a security perspective, even when hidden functionality is not intentionally malicious, it gives an attacker an additional opportunity for a successful application attack. For example, the hidden functionality could be useful for attacks that modify the control flow of the application.

References

  1. The Art of the Backdoor
  2. CWE-912: Hidden Functionality
  3. CWE-506: Embedded Malicious Code