结构: Simple
Abstraction: Base
状态: Draft
被利用可能性: unkown
The software validates data before it has been filtered, which prevents the software from detecting data that becomes invalid after the filtering step.
This can be used by an attacker to bypass the validation and launch attacks that expose weaknesses that would otherwise be prevented, such as injection.
cwe_Nature: ChildOf cwe_CWE_ID: 20 cwe_View_ID: 699 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 179 cwe_View_ID: 1000 cwe_Ordinal: Primary
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
Access Control | Bypass Protection Mechanism |
策略:
Inputs should be decoded and canonicalized to the application's current internal representation before being filtered.
This script creates a subdirectory within a user directory and sets the user as the owner.
bad PHP
While the script attempts to screen for '..' sequences, an attacker can submit a directory path including ".~.", which will then become ".." after the filtering step. This allows a Path Traversal (CWE-21) attack to occur.
标识 | 说明 | 链接 |
---|---|---|
CVE-2002-0934 | Directory traversal vulnerability allows remote attackers to read or modify arbitrary files via invalid characters between two . (dot) characters, which are filtered and result in a ".." sequence. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0934 |
CVE-2003-0282 | Directory traversal vulnerability allows attackers to overwrite arbitrary files via invalid characters between two . (dot) characters, which are filtered and result in a ".." sequence. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0282 |
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Validate-Before-Filter | ||
OWASP Top Ten 2004 | A1 | CWE More Specific | Unvalidated Input |