CWE-551 不正确的行为次序:在解析与净化处理之前进行授权 类弱点 6 条 CVE 漏洞汇总,含 AI 中文分析。
CWE-551属于逻辑顺序漏洞,指系统在解析和规范化URL前执行授权检查。攻击者利用路径遍历字符(如“/./”)绕过权限控制,访问受保护资源。因系统未统一处理路径语义,导致授权判断失效。开发者应在授权检查前,先对输入进行完整的解析、规范化及清理,确保路径语义一致,从而防止此类绕过行为。
| CVE ID | タイトル | CVSS | 深刻度 | 公開日 |
|---|---|---|---|---|
| CVE-2026-4636 | Keycloak: keycloak: uma policy bypass allows authenticated users to gain unauthorized access to victim-owned resources. — Red Hat build of Keycloak 26.2 | 8.1 | High | 2026-04-02 |
| CVE-2016-20030 | ZKTeco ZKBioSecurity 3.0 User Enumeration via authLoginAction — ZKTeco ZKBioSecurity | 9.8 | Critical | 2026-03-15 |
| CVE-2026-0707 | Keycloak: keycloak authorization header parsing leading to potential security control bypass — Red Hat build of Keycloak 26.4 | 5.3 | Medium | 2026-01-08 |
| CVE-2023-23924 | URI validation failure on SVG parsing in Dompdf — dompdf | 10.0 | Critical | 2023-01-31 |
| CVE-2021-32779 | Incorrectly handling of URI '#fragment' element as part of the path element — envoy | 8.6 | High | 2021-08-24 |
| CVE-2021-32777 | Incorrect concatenation of multiple value request headers in ext-authz extension — envoy | 8.6 | High | 2021-08-24 |
CWE-551(不正确的行为次序:在解析与净化处理之前进行授权) 是常见的弱点类别,本平台收录该类弱点关联的 6 条 CVE 漏洞。