CWE-692 黑名单不完全导致跨站脚本

admin 2021年12月16日15:52:54评论76 views字数 1227阅读4分5秒阅读模式

CWE-692 黑名单不完全导致跨站脚本

Incomplete Blacklist to Cross-Site Scripting

结构: Chain

Abstraction: Compound

状态: Draft

被利用可能性: unkown

基本描述

The product uses a blacklist-based protection mechanism to defend against XSS attacks, but the blacklist is incomplete, allowing XSS variants to succeed.

扩展描述

While XSS might seem simple to prevent, web browsers vary so widely in how they parse web pages, that a blacklist cannot keep track of all the variations. The "XSS Cheat Sheet" [REF-564] contains a large number of attacks that are intended to bypass incomplete blacklists.

相关缺陷

  • cwe_Nature: StartsWith cwe_CWE_ID: 184 cwe_View_ID: 709 cwe_Chain_ID: 692

  • cwe_Nature: ChildOf cwe_CWE_ID: 79 cwe_View_ID: 1000 cwe_Ordinal: Primary

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
['Confidentiality', 'Integrity', 'Availability'] Execute Unauthorized Code or Commands

分析过的案例

标识 说明 链接
CVE-2007-5727 Blacklist only removes https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5727
CVE-2006-3617 Blacklist only removes https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3617
CVE-2006-4308 Blacklist only checks "javascript:" tag https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4308

相关攻击模式

  • CAPEC-120
  • CAPEC-267
  • CAPEC-71
  • CAPEC-80
  • CAPEC-85

引用

文章来源于互联网:scap中文网

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年12月16日15:52:54
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-692 黑名单不完全导致跨站脚本https://cn-sec.com/archives/613197.html

发表评论

匿名网友 填写信息