Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-20 (输入验证不恰当) — Vulnerability Class 3357

3357 vulnerabilities classified as CWE-20 (输入验证不恰当). AI Chinese analysis included.

CWE-20 represents a critical software weakness where applications fail to properly verify the integrity, format, or type of incoming data before processing it. This oversight allows attackers to inject malicious payloads, such as SQL injection strings or cross-site scripting code, which can bypass security controls and compromise system integrity. Exploitation typically occurs when untrusted data from external sources, like user forms or network packets, is treated as executable code or trusted input. To mitigate this risk, developers must implement rigorous input validation strategies, including strict type checking, length constraints, and allow-listing acceptable characters. Additionally, employing parameterized queries and output encoding ensures that even if validation fails, the injected data remains inert, thereby preserving application security and preventing unauthorized execution or data exposure.

MITRE CWE Description
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. Input validation is a frequently-used technique for checking potentially dangerous inputs in order to ensure that the inputs are safe for processing within the code, or when communicating with other components. Input can consist of: raw data - strings, numbers, parameters, file contents, etc. metadata - information about the raw data, such as headers or size Data can be simple or structured. Structured data can be composed of many nested layers, composed of combinations of metadata and raw data, with other simple or structured data. Many properties of raw data or metadata may need to be validated upon entry into the code, such as: specified quantities such as size, length, frequency, price, rate, number of operations, time, etc. implied or derived quantities, such as the actual size of a file instead of a specified size indexes, offsets, or positions into more complex data structures symbolic keys or other elements into hash tables, associative arrays, etc. well-formedness, i.e. syntactic correctness - compliance with expected syntax lexical token correctness - compliance with rules for what is treated as a token specified or derived type - the actual type of the input (or what the input appears to be) consistency - between individual data el…
Common Consequences (3)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory)
An attacker could provide unexpected values and cause a program crash or arbitrary control of resource allocation, leading to excessive consumption of resources such as memory and CPU.
ConfidentialityRead Memory, Read Files or Directories
An attacker could read confidential data if they are able to control resource references.
Integrity, Confidentiality, AvailabilityModify Memory, Execute Unauthorized Code or Commands
An attacker could use malicious input to modify data or possibly alter control flow in unexpected ways, including arbitrary command execution.
Mitigations (5)
Architecture and DesignConsider using language-theoretic security (LangSec) techniques that characterize inputs using a formal language and build "recognizers" for that language. This effectively requires parsing to be a distinct layer that effectively enforces a boundary between raw input and internal data representations, instead of allowing parser code to be scattered throughout the program, where it could be subjec…
Architecture and DesignUse an input validation framework such as Struts or the OWASP ESAPI Validation API. Note that using a framework does not automatically address all input validation problems; be mindful of weaknesses that could arise from misusing the framework itself (CWE-1173).
Architecture and Design, ImplementationUnderstand all the potential areas where untrusted inputs can enter the product, including but not limited to: parameters or arguments, cookies, anything read from the network, environment variables, reverse DNS lookups, query results, request headers, URL components, e-mail, files, filenames, databases, and any external systems that provide data to the application. Remember that such inputs may b…
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Effectiveness: High
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server. Even though clien…
Examples (2)
This example demonstrates a shopping interaction in which the user is free to specify the quantity of items to be purchased and a total is calculated.
... public static final double price = 20.00; int quantity = currentUser.getAttribute("quantity"); double total = price * quantity; chargeUser(total); ...
Bad · Java
This example asks the user for a height and width of an m X n game board with a maximum dimension of 100 squares.
... #define MAX_DIM 100 ... /* board dimensions */ int m,n, error; board_square_t *board; printf("Please specify the board height: \n"); error = scanf("%d", &m); if ( EOF == error ){ die("No integer passed: Die evil hacker!\n"); } printf("Please specify the board width: \n"); error = scanf("%d", &n); if ( EOF == error ){ die("No integer passed: Die evil hacker!\n"); } if ( m > MAX_DIM || n > MAX_DIM ) { die("Value too large: Die evil hacker!\n"); } board = (board_square_t*) malloc( m * n * sizeof(board_square_t)); ...
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2020-3345 Cisco Webex Meetings and Cisco Webex Meetings Server HTML Injection Vulnerability — Cisco WebEx Meetings Server 4.3 -2020-07-16
CVE-2020-14503 Advantech iView 输入验证错误漏洞 — Advantech iView 9.8 -2020-07-15
CVE-2020-7588 Siemens Opcenter 输入验证错误漏洞 — Opcenter Execution Discrete 8.3 -2020-07-14
CVE-2020-8195 Citrix System SDWAN WAN-OP 路径遍历漏洞 — Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP 4.3 -2020-07-10
CVE-2020-8187 Citrix Systems Citrix Application Delivery Controller和Citrix Systems Gateway 输入验证错误漏洞 — Citrix ADC, Citrix Gateway 7.5 -2020-07-10
CVE-2020-7820 Tobesoft NEXACRO14/17 ExCommonApiV13 Arbitrary Code Execution Vulnerability — NEXACRO14/17 ExCommonApiV13 7.8 High2020-07-02
CVE-2020-7821 Tobesoft NEXACRO14/17 ExCommonApiV13 Arbitrary Code Execution Vulnerability — NEXACRO14/17 ExCommonApiV13 7.8 High2020-07-02
CVE-2020-5238 Denial of service in table parsing in cmark-gfm — cmark-gfm 6.5 Medium2020-07-01
CVE-2019-19163 Commax WallPad Remote Code Execution Vulnerability — Wallpad 7.5 High2020-06-30
CVE-2020-12033 Rockwell Automation FactoryTalk Services Platform 输入验证错误漏洞 — Rockwell Automation FactoryTalk Services Platform 8.8 -2020-06-23
CVE-2019-14894 Red Hat CloudForms Management Engine 操作系统命令注入漏洞 — CloudForms 8.0 High2020-06-22
CVE-2020-1727 Red Hat Keycloak 输入验证错误漏洞 — keycloak 6.4 Medium2020-06-22
CVE-2020-8102 Insufficient URL sanitization and validation in Safepay Browser (VA-8631) — Bitdefender Total Security 2020 8.8 High2020-06-22
CVE-2020-3263 Cisco Webex Meetings Desktop App URL Filtering Arbitrary Program Execution Vulnerability — Cisco WebEx Meetings Server 7.5 -2020-06-18
CVE-2020-3244 Cisco ASR 5000 Series Aggregation Services Routers Enhanced Charging Service Rule Bypass Vulnerability — Cisco ASR 5000 Series Software 5.3 -2020-06-18
CVE-2020-3368 Cisco Email Security Appliance URL Filtering Bypass Vulnerability — Cisco Email Security Appliance (ESA) 5.3 -2020-06-18
CVE-2020-7504 Schneider Electric Easergy T300 输入验证错误漏洞 — Easergy T300 (Firmware version 1.5.2 and older) 5.3 -2020-06-16
CVE-2020-12001 多款Rockwell Automation产品输入验证错误漏洞 — FactoryTalk Linx, RSLinx Classic, Connected Components Workbench, ControlFLASH Plus, FactoryTalk Asset Centre, FactoryTalk Linx CommDTM, Studio 5000 Launcher, Studio 5000 Logix Designer software 9.8 -2020-06-15
CVE-2020-11999 多款Rockwell Automation产品输入验证错误漏洞 — FactoryTalk Linx, RSLinx Classic, Connected Components Workbench, ControlFLASH Plus, FactoryTalk Asset Centre, FactoryTalk Linx CommDTM, Studio 5000 Launcher, Studio 5000 Logix Designer software 7.5 -2020-06-15
CVE-2020-10068 Zephyr Bluetooth DLE duplicate requests vulnerability — zephyr 5.1 Medium2020-06-05
CVE-2020-3257 Cisco IOx Application Environment for IOS Software for Cisco Industrial Routers Vulnerabilities — Cisco IOS 12.2(60)EZ16 8.0 -2020-06-03
CVE-2020-3238 Cisco IOx Application Framework Arbitrary File Creation Vulnerability — Cisco IOx 6.5 -2020-06-03
CVE-2020-3199 Cisco IOx Application Environment for IOS Software for Cisco Industrial Routers Vulnerabilities — Cisco IOS 12.2(60)EZ16 8.0 -2020-06-03
CVE-2020-3228 Cisco IOS, IOS XE, and NX-OS Software Security Group Tag Exchange Protocol Denial of Service Vulnerability — Cisco IOS 15.3(2)T 7.5 -2020-06-03
CVE-2020-3230 Cisco IOS and IOS XE Software Internet Key Exchange Version 2 Denial of Service Vulnerability — Cisco IOS 15.1(2)T 7.5 -2020-06-03
CVE-2020-3226 Cisco IOS and IOS XE Software Session Initiation Protocol Denial of Service Vulnerability — Cisco IOS 15.0(2)SG11a 7.5 -2020-06-03
CVE-2020-3225 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities — Cisco IOS 12.2(55)SE 8.6 -2020-06-03
CVE-2020-3221 Cisco IOS XE Software Flexible NetFlow Version 9 Denial of Service Vulnerability — Cisco IOS XE Software 16.10.1 8.6 -2020-06-03
CVE-2020-3218 Cisco IOS XE Software Web UI Remote Code Execution Vulnerability — Cisco IOS XE Software 16.6.1 7.2 -2020-06-03
CVE-2020-3217 Cisco IOS, IOS XE, IOS XR, and NX-OS Software One Platform Kit Remote Code Execution Vulnerability — Cisco IOS XR Software 8.8 -2020-06-03

Vulnerabilities classified as CWE-20 (输入验证不恰当) represent 3357 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.