Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-626 (空字节交互错误) — Vulnerability Class 3

3 vulnerabilities classified as CWE-626 (空字节交互错误). AI Chinese analysis included.

CWE-626 represents a critical input validation weakness where software fails to properly handle null bytes during data transitions between different programming languages or system components. This vulnerability arises because null bytes serve as string terminators in C-based libraries but are treated as valid characters in languages like PHP or Perl. Attackers typically exploit this discrepancy by injecting null bytes into user-controlled input to truncate expected string processing, thereby bypassing security checks or manipulating file path resolutions. For instance, an attacker might append a null byte to a filename to trick a C-based backend into ignoring a malicious extension that a PHP frontend validated. To mitigate this risk, developers must implement strict input sanitization that explicitly rejects or escapes null bytes before processing. Additionally, using consistent data handling libraries and avoiding mixed-language interfaces where possible reduces the likelihood of representation mismatches that lead to such poisoning errors.

MITRE CWE Description
The product does not properly handle null bytes or NUL characters when passing data between different representations or components. A null byte (NUL character) can have different meanings across representations or languages. For example, it is a string terminator in standard C libraries, but Perl and PHP strings do not treat it as a terminator. When two representations are crossed - such as when Perl or PHP invokes underlying C functionality - this can produce an interaction error with unexpected results. Similar issues have been reported for ASP. Other interpreters written in C might also be affected. The poison null byte is frequently useful in path traversal attacks by terminating hard-coded extensions that are added to a filename. It can play a role in regular expression processing in PHP.
Common Consequences (1)
IntegrityUnexpected State
Mitigations (1)
ImplementationRemove null bytes from all incoming strings.
CVE IDTitleCVSSSeverityPublished
CVE-2020-10773 Linux kernel 安全漏洞 — kernel 4.4 Medium2020-09-10
CVE-2019-17137 NETGEAR AC1200 R6220 Smart WiFi Router 授权问题漏洞 — AC1200 8.8 -2020-02-10
CVE-2019-11936 Facebook HHVM 缓冲区错误漏洞 — HHVM 9.8 -2019-12-04

Vulnerabilities classified as CWE-626 (空字节交互错误) represent 3 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.