Scope | Impact | Likelihood |
---|---|---|
Integrity | Unexpected State |
References | Description |
---|---|
CVE-2008-1284 | NUL byte in theme name causes directory traversal impact to be worse |
CVE-2005-2008 | Source code disclosure using trailing null. |
CVE-2005-3293 | Source code disclosure using trailing null. |
CVE-2005-2061 | Trailing null allows file include. |
CVE-2002-1774 | Null character in MIME header allows detection bypass. |
CVE-2000-0149 | Web server allows remote attackers to view the source code for CGI programs via a null character (%00) at the end of a URL. |
CVE-2000-0671 | Web server earlier allows allows remote attackers to bypass access restrictions, list directory contents, and read source code by inserting a null character (%00) in the URL. |
CVE-2001-0738 | Logging system allows an attacker to cause a denial of service (hang) by causing null bytes to be placed in log messages. |
CVE-2001-1140 | Web server allows source code for executable programs to be read via a null character (%00) at the end of a request. |
CVE-2002-1031 | Protection mechanism for limiting file access can be bypassed using a null character (%00) at the end of the directory name. |
CVE-2002-1025 | Application server allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed. |
CVE-2003-0768 | XSS protection mechanism only checks for sequences with an alphabetical character following a (<), so a non-alphabetical or null character (%00) following a < may be processed. |
CVE-2004-0189 | Decoding function in proxy allows regular expression bypass in ACLs via URLs with null characters. |
CVE-2005-3153 | Null byte bypasses PHP regexp check (interaction error). |
CVE-2005-4155 | Null byte bypasses PHP regexp check (interaction error). |
Assume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.
When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, "boat" may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as "red" or "blue."
Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code's environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.
CAPEC-ID | Attack Pattern Name |
---|---|
CAPEC-52 | Embedding NULL Bytes An adversary embeds one or more null bytes in input to the target software. This attack relies on the usage of a null-valued byte as a string terminator in many environments. The goal is for certain components of the target software to stop processing the input when it encounters the null byte(s). |
CAPEC-53 | Postfix, Null Terminate, and Backslash If a string is passed through a filter of some kind, then a terminal NULL may not be valid. Using alternate representation of NULL allows an adversary to embed the NULL mid-string while postfixing the proper data so that the filter is avoided. One example is a filter that looks for a trailing slash character. If a string insertion is possible, but the slash must exist, an alternate encoding of NULL in mid-string may be used. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
PLOVER | Draft 3 |
Name | Organization | Date | Comment |
---|---|---|---|
Eric Dalci | Cigital | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Relationships, Relationship_Notes, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Observed_Examples | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Description, Name | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Observed_Examples, References, Relationships | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Applicable_Platforms | |
CWE Content Team | MITRE | updated Potential_Mitigations, Relationships | |
CWE Content Team | MITRE | updated Observed_Examples, Potential_Mitigations | |
CWE Content Team | MITRE | updated Description, Potential_Mitigations | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes |