CWE-183: Permissive List of Allowed Inputs

Base Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are explicitly allowed by policy because the inputs are assumed to be safe, but the list is too permissive - that is, it allows an input that is unsafe, leading to resultant weaknesses.

常见后果

影响范围: Access Control

技术影响: Bypass Protection Mechanism

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2019-12799

chain: bypass of untrusted deserialization issue (CWE-502) by using an assumed-trusted class (CWE-183)

参考: CVE-2019-10458

sandbox bypass using a method that is on an allowlist

参考: CVE-2017-1000095

sandbox bypass using unsafe methods that are on an allowlist

参考: CVE-2019-10458

CI/CD pipeline feature has unsafe elements in allowlist, allowing bypass of script restrictions

参考: CVE-2017-1000095

Default allowlist includes unsafe methods, allowing bypass of sandbox

引入模式

阶段 说明
Implementation -

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Permissive Whitelist -
关键信息

CWE ID: CWE-183

抽象级别: Base

结构: Simple

状态: Draft

相关弱点
相关攻击模式
CAPEC-120 CAPEC-3 CAPEC-43 CAPEC-71