CWE-436: Interpretation Conflict

Class Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.

扩展描述

This is generally found in proxies, firewalls, anti-virus software, and other intermediary devices that monitor, allow, deny, or modify traffic based on how the client or server is expected to behave.

常见后果

影响范围: Integrity Other

技术影响: Unexpected State Varies by Context

观察示例

参考: CVE-2005-1215

Bypass filters or poison web cache using requests with multiple Content-Length headers, a non-standard behavior.

参考: CVE-2002-0485

Anti-virus product allows bypass via Content-Type and Content-Disposition headers that are mixed case, which are still processed by some clients.

参考: CVE-2002-1978

FTP clients sending a command with "PASV" in the argument can cause firewalls to misinterpret the server's error as a valid response, allowing filter bypass.

参考: CVE-2002-1979

FTP clients sending a command with "PASV" in the argument can cause firewalls to misinterpret the server's error as a valid response, allowing filter bypass.

参考: CVE-2002-0637

Virus product bypass with spaces between MIME header fields and the ":" separator, a non-standard message that is accepted by some clients.

参考: CVE-2002-1777

AV product detection bypass using inconsistency manipulation (file extension in MIME Content-Type vs. Content-Disposition field).

参考: CVE-2005-3310

CMS system allows uploads of files with GIF/JPG extensions, but if they contain HTML, Internet Explorer renders them as HTML instead of images.

参考: CVE-2005-4260

Interpretation conflict allows XSS via invalid "<" when a ">" is expected, which is treated as ">" by many web browsers.

参考: CVE-2005-4080

Interpretation conflict (non-standard behavior) enables XSS because browser ignores invalid characters in the middle of tags.

引入模式

阶段 说明
Architecture and Design -
Implementation -

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Multiple Interpretation Error (MIE) -
WASC 27 HTTP Response Smuggling -
关键信息

CWE ID: CWE-436

抽象级别: Class

结构: Simple

状态: Incomplete

相关弱点
相关攻击模式
CAPEC-105 CAPEC-273 CAPEC-34