CWE-76: Improper Neutralization of Equivalent Special Elements

Base Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product correctly neutralizes certain special elements, but it improperly neutralizes equivalent special elements.

扩展描述

The product may have a fixed list of special characters it believes is complete. However, there may be alternate encodings, or representations that also have the same meaning. For example, the product may filter out a leading slash (/) to prevent absolute path names, but does not account for a tilde (~) followed by a user name, which on some *nix systems could be expanded to an absolute pathname. Alternately, the product might filter a dangerous "-e" command-line switch when calling an external program, but it might not account for "--exec" or other switches that have the same semantics.

常见后果

影响范围: Other

技术影响: Other

潜在缓解措施

阶段: Requirements

描述: Programming languages and supporting technologies might be chosen which are not subject to these issues.

阶段: Implementation

描述: Utilize an appropriate mix of allowlist and denylist parsing to filter equivalent special element syntax from all input.

引入模式

阶段 说明
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Equivalent Special Element Injection -
关键信息

CWE ID: CWE-76

抽象级别: Base

结构: Simple

状态: Draft

利用可能性: High

相关弱点