CWE-76: Improper Neutralization of Equivalent Special Elements
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The product correctly neutralizes certain special elements, but it improperly neutralizes equivalent special elements.
扩展描述
The product may have a fixed list of special characters it believes is complete. However, there may be alternate encodings, or representations that also have the same meaning. For example, the product may filter out a leading slash (/) to prevent absolute path names, but does not account for a tilde (~) followed by a user name, which on some *nix systems could be expanded to an absolute pathname. Alternately, the product might filter a dangerous "-e" command-line switch when calling an external program, but it might not account for "--exec" or other switches that have the same semantics.
常见后果
影响范围: Other
技术影响: Other
潜在缓解措施
阶段: Requirements
描述: Programming languages and supporting technologies might be chosen which are not subject to these issues.
阶段: Implementation
描述: Utilize an appropriate mix of allowlist and denylist parsing to filter equivalent special element syntax from all input.
引入模式
| 阶段 | 说明 |
|---|---|
| Implementation | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
适用平台
编程语言
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| PLOVER | - | Equivalent Special Element Injection | - |