CWE-75 特殊命令到另一不同平面时的净化处理不恰当(特殊命令注入)

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)

结构: Simple

Abstraction: Class

状态: Draft

被利用可能性: unkown

基本描述

The software does not adequately filter user-controlled input for special elements with control implications.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 74 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 74 cwe_View_ID: 699 cwe_Ordinal: Primary

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
['Integrity', 'Confidentiality', 'Availability'] ['Modify Application Data', 'Execute Unauthorized Code or Commands']

可能的缓解方案

Requirements

策略:

Programming languages and supporting technologies might be chosen which are not subject to these issues.

Implementation

策略:

Utilize an appropriate mix of whitelist and blacklist parsing to filter special element syntax from all input.

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
PLOVER Special Element Injection

相关攻击模式

  • CAPEC-81
  • CAPEC-93