目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-182 数据的崩溃导致不安全数值 类漏洞列表 1

CWE-182 数据的崩溃导致不安全数值 类弱点 1 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-182属于数据验证类漏洞,指产品过滤数据时导致其被缩减或“折叠”为违反安全预期的不安全值。攻击者通常通过构造特殊输入,利用过滤逻辑缺陷使数据降级,从而绕过安全机制或触发意外行为。开发者应避免过度简化或错误转换数据,确保过滤过程严格保留数据的完整性与语义,并实施严格的输入验证与类型检查,防止数据在处理后偏离预期的安全状态。

MITRE CWE 官方描述
CWE:CWE-182 数据坍缩至不安全值(Collapse of Data into Unsafe Value) 英文:产品以某种方式过滤数据,导致数据被缩减或“坍缩”为一个违反预期安全属性的不安全值。
常见影响 (1)
Access ControlBypass Protection Mechanism
缓解措施 (4)
Architecture and DesignAvoid making decisions based on names of resources (e.g. files) if those resources can have alternate names.
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
Canonicalize the name to match that of the file system's representation of the name. This can sometimes be achieved with an available API (e.g. in Win32 the GetFullPathName function).
CVE ID标题CVSS风险等级Published
CVE-2020-7921 MongoDB Server 安全漏洞 — MongoDB Server 4.6 Medium2020-05-06

CWE-182(数据的崩溃导致不安全数值) 是常见的弱点类别,本平台收录该类弱点关联的 1 条 CVE 漏洞。