目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-129 对数组索引的验证不恰当 类漏洞列表 182

CWE-129 对数组索引的验证不恰当 类弱点 182 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-129 属于数组索引验证不当漏洞,指程序使用不可信输入计算数组索引时,未进行有效校验或校验逻辑错误,导致索引越界。攻击者通常通过构造恶意输入,使索引指向非法内存位置,从而引发缓冲区溢出、数据篡改或拒绝服务攻击。开发者应严格验证输入数据的范围,确保其始终处于数组合法边界内,并采用安全的边界检查机制,从源头阻断越界访问风险。

MITRE CWE 官方描述
CWE:CWE-129 数组索引验证不当 (Improper Validation of Array Index) 英文:产品在计算或使用数组索引时使用了不可信输入 (untrusted input),但未对索引进行验证或验证不正确,未能确保该索引引用数组内的有效位置 (valid position)。
常见影响 (5)
Integrity, AvailabilityDoS: Crash, Exit, or Restart
Use of an index that is outside the bounds of an array will very likely result in the corruption of relevant memory and perhaps instructions, leading to a crash, if the values are outside of the valid memory area.
IntegrityModify Memory
If the memory corrupted is data, rather than instructions, the system will continue to function with improper values.
Confidentiality, IntegrityModify Memory, Read Memory
Use of an index that is outside the bounds of an array can also trigger out-of-bounds read or write operations, or operations on the wrong objects; i.e., "buffer overflows" are not always the result. This may result in the exposure or modification of sensitive data.
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
If the memory accessible by the attacker can be effectively controlled, it may be possible to execute arbitrary code, as with a standard buffer overflow and possibly without the use of large inputs if a precise index can be controlled.
Integrity, Availability, ConfidentialityDoS: Crash, Exit, or Restart, Execute Unauthorized Code or Commands, Read Memory, Modify Memory
A single fault could allow either an overflow (CWE-788) or underflow (CWE-786) of the array index. What happens next will depend on the type of operation being performed out of bounds, but can expose sensitive information, cause a system crash, or possibly lead to arbitrary code execution.
缓解措施 (5)
Architecture and DesignUse an input validation framework such as Struts or the OWASP ESAPI Validation API. Note that using a framework does not automatically address all input validation problems; be mindful of weaknesses that could arise from misusing the framework itself (CWE-1173).
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server. Even though clien…
RequirementsUse a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, Ada allows the programmer to constrain the values of a variable and languages such as Java and Ruby will allow the programmer to handle exceptions when an out-of-bounds index is accessed.
Operation, Build and CompilationRun or compile the software using features or extensions that randomly arrange the positions of a program's executable and libraries in memory. Because this makes the addresses unpredictable, it can prevent an attacker from reliably jumping to exploitable code. Examples include Address Space Layout Randomization (ASLR) [REF-58] [REF-60] and Position-Independent Executables (PIE) [REF-64]. Imported…
Effectiveness: Defense in Depth
OperationUse a CPU and operating system that offers Data Execution Protection (using hardware NX or XD bits) or the equivalent techniques that simulate this feature in software, such as PaX [REF-60] [REF-61]. These techniques ensure that any instruction executed is exclusively at a memory address that is part of the code segment. For more information on these techniques see D3-PSEP (Process Segment Executi…
Effectiveness: Defense in Depth
代码示例 (2)
In the code snippet below, an untrusted integer value is used to reference an object in an array.
public String getValue(int index) { return array[index]; }
Bad · Java
The following example takes a user-supplied value to allocate an array of objects and then operates on the array.
private void buildList ( int untrustedListSize ){ if ( 0 > untrustedListSize ){ die("Negative value supplied for list size, die evil hacker!"); } Widget[] list = new Widget [ untrustedListSize ]; list[0] = new Widget(); }
Bad · Java
CVE ID标题CVSS风险等级Published
CVE-2024-49832 Qualcomm Chipsets 输入验证错误漏洞 — Snapdragon 7.8 High2025-02-03
CVE-2024-45582 Qualcomm Chipsets 输入验证错误漏洞 — Snapdragon 7.8 High2025-02-03
CVE-2024-45569 Qualcomm Chipsets 输入验证错误漏洞 — Snapdragon 9.8 Critical2025-02-03
CVE-2024-45550 Qualcomm Chipsets 输入验证错误漏洞 — Snapdragon 7.8 High2025-01-06
CVE-2024-33044 Qualcomm Chipsets 安全漏洞 — Snapdragon 8.4 High2024-12-02
CVE-2024-47249 Apache NimBLE 安全漏洞 — Apache NimBLE 6.5AIMediumAI2024-11-26
CVE-2024-51517 Huawei HarmonyOS 安全漏洞 — HarmonyOS 5.1 Medium2024-11-05
CVE-2024-33032 Qualcomm Chipsets 安全漏洞 — Snapdragon 6.7 Medium2024-11-04
CVE-2024-5680 Schneider Electric EcoStruxure Foxboro DCS 输入验证错误漏洞 — EcoStruxure Foxboro DCS Core Control Services 7.1 High2024-07-11
CVE-2024-21522 Audify.js 安全漏洞 — audify 7.5 High2024-07-10
CVE-2024-32673 SAMSUNG WALRUS 安全漏洞 — Walrus 5.5 Medium2024-07-03
CVE-2024-22181 libigl 安全漏洞 — libigl 7.8 High2024-05-28
CVE-2023-40477 RAR 安全漏洞 — WinRAR 7.8 -2024-05-03
CVE-2023-27349 SUSE Linux Enterprise Server 安全漏洞 — BlueZ 8.0 -2024-05-03
CVE-2023-51455 DJI Mavic和Matrice安全漏洞 — Mavic 3 Pro 6.8 Medium2024-04-02
CVE-2023-33111 Qualcomm Chipsets 安全漏洞 — Snapdragon 5.5 Medium2024-04-01
CVE-2024-29231 Synology Surveillance Station 安全漏洞 — Surveillance Station 5.4 Medium2024-03-28
CVE-2024-2214 Eclipse ThreadX RTOS 安全漏洞 — ThreadX 7.0 High2024-03-26
CVE-2024-0901 wolfSSL 安全漏洞 — wolfSSL 7.5 High2024-03-25
CVE-2024-21493 caddy-security 安全漏洞 — github.com/greenpau/caddy-security 5.3 Medium2024-02-17
CVE-2024-24563 Vyper 输入验证错误漏洞 — vyper 9.8 Critical2024-02-07
CVE-2023-43535 Qualcomm Chipsets 安全漏洞 — Snapdragon 8.4 High2024-02-06
CVE-2023-35994 GTKWave 输入验证错误漏洞 — GTKWave 7.8 High2024-01-08
CVE-2023-35995 GTKWave 输入验证错误漏洞 — GTKWave 7.8 High2024-01-08
CVE-2023-35997 GTKWave 输入验证错误漏洞 — GTKWave 7.8 High2024-01-08
CVE-2023-35996 GTKWave 输入验证错误漏洞 — GTKWave 7.8 High2024-01-08
CVE-2023-39234 GTKWave 输入验证错误漏洞 — GTKWave 7.8 High2024-01-08
CVE-2023-39235 GTKWave 输入验证错误漏洞 — GTKWave 7.8 High2024-01-08
CVE-2023-33053 Qualcomm Chipsets 安全漏洞 — Snapdragon 8.4 High2023-12-05
CVE-2023-6298 iText 输入验证错误漏洞 — iText 4.3 Medium2023-11-26

CWE-129(对数组索引的验证不恰当) 是常见的弱点类别,本平台收录该类弱点关联的 182 条 CVE 漏洞。