CWE-624 可执行体正则表达式错误

admin 2021年12月4日16:18:28评论70 views字数 1693阅读5分38秒阅读模式

CWE-624 可执行体正则表达式错误

Executable Regular Expression Error

结构: Simple

Abstraction: Base

状态: Incomplete

被利用可能性: unkown

基本描述

The product uses a regular expression that either (1) contains an executable component with user-controlled inputs, or (2) allows a user to enable execution by inserting pattern modifiers.

扩展描述

Case (2) is possible in the PHP preg_replace() function, and possibly in other languages when a user-controlled input is inserted into a string that is later parsed as a regular expression.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 77 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 77 cwe_View_ID: 699 cwe_Ordinal: Primary

适用平台

Language: [{'cwe_Name': 'PHP', 'cwe_Prevalence': 'Undetermined'}, {'cwe_Name': 'Perl', 'cwe_Prevalence': 'Undetermined'}]

常见的影响

范围 影响 注释
['Confidentiality', 'Integrity', 'Availability'] Execute Unauthorized Code or Commands

可能的缓解方案

Implementation

策略:

The regular expression feature in some languages allows inputs to be quoted or escaped before insertion, such as Q and E in Perl.

分析过的案例

标识 说明 链接
CVE-2006-2059 Executable regexp in PHP by inserting "e" modifier into first argument to preg_replace https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2059
CVE-2005-3420 Executable regexp in PHP by inserting "e" modifier into first argument to preg_replace https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3420
CVE-2006-2878 Complex curly syntax inserted into the replacement argument to PHP preg_replace(), which uses the "/e" modifier https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2878
CVE-2006-2908 Function allows remote attackers to execute arbitrary PHP code via the username field, which is used in a preg_replace function call with a /e (executable) modifier. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2908

Notes

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
Software Fault Patterns SFP24 Tainted input to command

文章来源于互联网:scap中文网

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年12月4日16:18:28
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-624 可执行体正则表达式错误https://cn-sec.com/archives/613439.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息