CWE-692 黑名单不完全导致跨站脚本
Incomplete Blacklist to Cross-Site Scripting
结构: Chain
Abstraction: Compound
状态: Draft
被利用可能性: unkown
基本描述
The product uses a blacklist-based protection mechanism to defend against XSS attacks, but the blacklist is incomplete, allowing XSS variants to succeed.
扩展描述
While XSS might seem simple to prevent, web browsers vary so widely in how they parse web pages, that a blacklist cannot keep track of all the variations. The "XSS Cheat Sheet" [REF-564] contains a large number of attacks that are intended to bypass incomplete blacklists.
相关缺陷
-
cwe_Nature: StartsWith cwe_CWE_ID: 184 cwe_View_ID: 709 cwe_Chain_ID: 692
-
cwe_Nature: ChildOf cwe_CWE_ID: 79 cwe_View_ID: 1000 cwe_Ordinal: Primary
适用平台
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
常见的影响
范围 | 影响 | 注释 |
---|---|---|
['Confidentiality', 'Integrity', 'Availability'] | Execute Unauthorized Code or Commands |
分析过的案例
标识 | 说明 | 链接 |
---|---|---|
CVE-2007-5727 | Blacklist only removes | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5727 |
CVE-2006-3617 | Blacklist only removes | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3617 |
CVE-2006-4308 | Blacklist only checks "javascript:" tag | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4308 |
相关攻击模式
- CAPEC-120
- CAPEC-267
- CAPEC-71
- CAPEC-80
- CAPEC-85
引用
文章来源于互联网:scap中文网
- 左青龙
- 微信扫一扫
- 右白虎
- 微信扫一扫
评论