Scope | Impact | Likelihood |
---|---|---|
Other | Unexpected State, Varies by Context Note: When the regular expression is not correctly specified, data might have a different format or type than the rest of the program expects, producing resultant weaknesses or errors. | |
Access Control | Bypass Protection Mechanism Note: In PHP, regular expression checks can sometimes be bypassed with a null byte, leading to any number of weaknesses. |
References | Description |
---|---|
CVE-2002-2109 | Regexp isn't "anchored" to the beginning or end, which allows spoofed values that have trusted values as substrings. |
CVE-2005-1949 | Regexp for IP address isn't anchored at the end, allowing appending of shell metacharacters. |
CVE-2001-1072 | Bypass access restrictions via multiple leading slash, which causes a regular expression to fail. |
CVE-2000-0115 | Local user DoS via invalid regular expressions. |
CVE-2002-1527 | chain: Malformed input generates a regular expression error that leads to information exposure. |
CVE-2005-1061 | Certain strings are later used in a regexp, leading to a resultant crash. |
CVE-2005-2169 | MFV. Regular expression intended to protect against directory traversal reduces ".../...//" to "../". |
CVE-2005-0603 | Malformed regexp syntax leads to information exposure in error message. |
CVE-2005-1820 | Code injection due to improper quoting of regular expression. |
CVE-2005-3153 | Null byte bypasses PHP regexp check. |
CVE-2005-4155 | Null byte bypasses PHP regexp check. |
CAPEC-ID | Attack Pattern Name |
---|---|
CAPEC-15 | Command Delimiters An attack of this type exploits a programs' vulnerabilities that allows an attacker's commands to be concatenated onto a legitimate command with the intent of targeting other resources such as the file system or database. The system that uses a filter or denylist input validation, as opposed to allowlist validation is vulnerable to an attacker who predicts delimiters (or combinations of delimiters) not present in the filter or denylist. As with other injection attacks, the attacker uses the command delimiter payload as an entry point to tunnel through the application and activate additional attacks through SQL queries, shell commands, network scanning, and so on. |
CAPEC-6 | Argument Injection An attacker changes the behavior or state of a targeted application through injecting data or command syntax through the targets use of non-validated and non-filtered arguments of exposed services or methods. |
CAPEC-79 | Using Slashes in Alternate Encoding This attack targets the encoding of the Slash characters. An adversary would try to exploit common filtering problems related to the use of the slashes characters to gain access to resources on the target host. Directory-driven systems, such as file systems and databases, typically use the slash character to indicate traversal between directories or other container components. For murky historical reasons, PCs (and, as a result, Microsoft OSs) choose to use a backslash, whereas the UNIX world typically makes use of the forward slash. The schizophrenic result is that many MS-based systems are required to understand both forms of the slash. This gives the adversary many opportunities to discover and abuse a number of common filtering problems. The goal of this pattern is to discover server software that only applies filters to one version, but not the other. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
PLOVER | Draft 3 |
Name | Organization | Date | Comment |
---|---|---|---|
Eric Dalci | Cigital | updated Time_of_Introduction | |
CWE Content Team | MITRE | updated Description, Name, Relationships, Observed_Example, Other_Notes, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Common_Consequences, Other_Notes | |
CWE Content Team | MITRE | updated References | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Observed_Examples | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Related_Attack_Patterns, Relationships | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Applicable_Platforms, Common_Consequences, Other_Notes, Relationship_Notes | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated References | |
CWE Content Team | MITRE | updated References | |
CWE Content Team | MITRE | updated Related_Attack_Patterns, Relationships, Type | |
CWE Content Team | MITRE | updated Relationships, Type | |
CWE Content Team | MITRE | updated Relationship_Notes | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Relationships | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Detection_Factors, Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes |