目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-129 对数组索引的验证不恰当 类漏洞列表 182

CWE-129 对数组索引的验证不恰当 类弱点 182 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-129 属于数组索引验证不当漏洞,指程序使用不可信输入计算数组索引时,未进行有效校验或校验逻辑错误,导致索引越界。攻击者通常通过构造恶意输入,使索引指向非法内存位置,从而引发缓冲区溢出、数据篡改或拒绝服务攻击。开发者应严格验证输入数据的范围,确保其始终处于数组合法边界内,并采用安全的边界检查机制,从源头阻断越界访问风险。

MITRE CWE 官方描述
CWE:CWE-129 数组索引验证不当 (Improper Validation of Array Index) 英文:产品在计算或使用数组索引时使用了不可信输入 (untrusted input),但未对索引进行验证或验证不正确,未能确保该索引引用数组内的有效位置 (valid position)。
常见影响 (5)
Integrity, AvailabilityDoS: Crash, Exit, or Restart
Use of an index that is outside the bounds of an array will very likely result in the corruption of relevant memory and perhaps instructions, leading to a crash, if the values are outside of the valid memory area.
IntegrityModify Memory
If the memory corrupted is data, rather than instructions, the system will continue to function with improper values.
Confidentiality, IntegrityModify Memory, Read Memory
Use of an index that is outside the bounds of an array can also trigger out-of-bounds read or write operations, or operations on the wrong objects; i.e., "buffer overflows" are not always the result. This may result in the exposure or modification of sensitive data.
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
If the memory accessible by the attacker can be effectively controlled, it may be possible to execute arbitrary code, as with a standard buffer overflow and possibly without the use of large inputs if a precise index can be controlled.
Integrity, Availability, ConfidentialityDoS: Crash, Exit, or Restart, Execute Unauthorized Code or Commands, Read Memory, Modify Memory
A single fault could allow either an overflow (CWE-788) or underflow (CWE-786) of the array index. What happens next will depend on the type of operation being performed out of bounds, but can expose sensitive information, cause a system crash, or possibly lead to arbitrary code execution.
缓解措施 (5)
Architecture and DesignUse an input validation framework such as Struts or the OWASP ESAPI Validation API. Note that using a framework does not automatically address all input validation problems; be mindful of weaknesses that could arise from misusing the framework itself (CWE-1173).
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server. Even though clien…
RequirementsUse a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, Ada allows the programmer to constrain the values of a variable and languages such as Java and Ruby will allow the programmer to handle exceptions when an out-of-bounds index is accessed.
Operation, Build and CompilationRun or compile the software using features or extensions that randomly arrange the positions of a program's executable and libraries in memory. Because this makes the addresses unpredictable, it can prevent an attacker from reliably jumping to exploitable code. Examples include Address Space Layout Randomization (ASLR) [REF-58] [REF-60] and Position-Independent Executables (PIE) [REF-64]. Imported…
Effectiveness: Defense in Depth
OperationUse a CPU and operating system that offers Data Execution Protection (using hardware NX or XD bits) or the equivalent techniques that simulate this feature in software, such as PaX [REF-60] [REF-61]. These techniques ensure that any instruction executed is exclusively at a memory address that is part of the code segment. For more information on these techniques see D3-PSEP (Process Segment Executi…
Effectiveness: Defense in Depth
代码示例 (2)
In the code snippet below, an untrusted integer value is used to reference an object in an array.
public String getValue(int index) { return array[index]; }
Bad · Java
The following example takes a user-supplied value to allocate an array of objects and then operates on the array.
private void buildList ( int untrustedListSize ){ if ( 0 > untrustedListSize ){ die("Negative value supplied for list size, die evil hacker!"); } Widget[] list = new Widget [ untrustedListSize ]; list[0] = new Widget(); }
Bad · Java
CVE ID标题CVSS风险等级Published
CVE-2026-41643 GoBGP 恶意BGP UPDATE导致远程拒绝服务漏洞 — gobgp 7.5 High2026-05-07
CVE-2026-40251 Incus 快照元数据处理越界崩溃导致拒绝服务漏洞 — incus--2026-05-06
CVE-2026-40886 Argo Workflows 输入验证错误漏洞 — argo-workflows 7.7 High2026-04-23
CVE-2026-6840 ONE 输入验证错误漏洞 — ONE 5.5 Medium2026-04-22
CVE-2026-40097 Smallstep step-ca 输入验证错误漏洞 — certificates 3.7 Low2026-04-10
CVE-2026-34942 wasmtime 输入验证错误漏洞 — wasmtime 7.7AIHighAI2026-04-09
CVE-2026-21413 Libraw 安全漏洞 — LibRaw 9.8 Critical2026-04-07
CVE-2026-33762 go-git 输入验证错误漏洞 — go-git 2.8 Low2026-03-31
CVE-2026-33281 Ella Core 输入验证错误漏洞 — core 6.5 Medium2026-03-23
CVE-2026-33022 Tekton Pipelines 输入验证错误漏洞 — pipeline 6.5 Medium2026-03-20
CVE-2026-32937 free5GC 输入验证错误漏洞 — chf 6.5 -2026-03-20
CVE-2026-26933 Elastic Packetbeat 安全漏洞 — Packetbeat 5.7 Medium2026-03-19
CVE-2026-3083 GStreamer 输入验证错误漏洞 — GStreamer 9.8 -2026-03-13
CVE-2026-26932 Elastic Packetbeat 安全漏洞 — Packetbeat 5.7 Medium2026-02-26
CVE-2026-25882 Fiber 安全漏洞 — fiber 7.5AIHighAI2026-02-24
CVE-2025-69248 free5GC 输入验证错误漏洞 — amf 7.5AIHighAI2026-02-23
CVE-2023-20601 AMD Graphics Driver 安全漏洞 — AMD Radeon™ PRO VII 5.5AIMediumAI2026-02-12
CVE-2026-2006 PostgreSQL 安全漏洞 — PostgreSQL 8.8 High2026-02-12
CVE-2026-25518 cert-manager 代码问题漏洞 — cert-manager 5.9 Medium2026-02-04
CVE-2026-25068 alsa-lib 输入验证错误漏洞 — alsa-lib 6.5 -2026-01-29
CVE-2026-0529 Elastic Packetbeat 安全漏洞 — Packetbeat 6.5 Medium2026-01-14
CVE-2026-0528 Elastic Metricbeat 安全漏洞 — Metricbeat 6.5 Medium2026-01-13
CVE-2025-47393 Qualcomm Chipsets 输入验证错误漏洞 — Snapdragon 7.8 High2026-01-06
CVE-2025-15271 FontForge 输入验证错误漏洞 — FontForge 7.8 -2025-12-31
CVE-2025-15270 FontForge 输入验证错误漏洞 — FontForge 7.8 -2025-12-31
CVE-2025-66559 Taiko Alethia 输入验证错误漏洞 — taiko-mono 9.1AICriticalAI2025-12-04
CVE-2025-61915 OpenPrinting CUPS 输入验证错误漏洞 — cups 6.0 Medium2025-11-29
CVE-2025-0657 Automated Logic WebCtrl和Carrier i-Vu 安全漏洞 — WebCtrl 7.5 -2025-11-27
CVE-2025-62372 vLLM 输入验证错误漏洞 — vllm 7.5 -2025-11-21
CVE-2025-10158 Rsync 安全漏洞 — rsync 4.3 Medium2025-11-18

CWE-129(对数组索引的验证不恰当) 是常见的弱点类别,本平台收录该类弱点关联的 182 条 CVE 漏洞。