Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-74 (输出中的特殊元素转义处理不恰当(注入)) — Vulnerability Class 375

375 vulnerabilities classified as CWE-74 (输出中的特殊元素转义处理不恰当(注入)). AI Chinese analysis included.

CWE-74 represents a critical input validation weakness where software constructs commands, data structures, or records using externally influenced input without properly neutralizing special elements. This flaw allows attackers to inject malicious syntax that alters the intended interpretation of the downstream component, leading to severe consequences such as unauthorized command execution, data manipulation, or system compromise. Exploitation typically occurs when user-supplied data is directly concatenated into queries or system calls without sanitization. To prevent this, developers must implement rigorous input validation, ensuring all external data is strictly checked against expected formats. Furthermore, utilizing parameterized queries, safe APIs, and context-specific encoding techniques ensures that special characters are treated as literal data rather than executable instructions, effectively neutralizing potential injection vectors before they reach the downstream processor.

MITRE CWE Description
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Common Consequences (5)
ConfidentialityRead Application Data
Many injection attacks involve the disclosure of important information -- in terms of both data sensitivity and usefulness in further exploitation.
Access ControlBypass Protection Mechanism
In some cases, injectable code controls authentication; this may lead to a remote vulnerability.
OtherAlter Execution Logic
Injection attacks are characterized by the ability to significantly change the flow of a given process, and in some cases, to the execution of arbitrary code.
Integrity, OtherOther
Data injection attacks lead to loss of data integrity in nearly all cases as the control-plane data injected is always incidental to data recall or writing.
Non-RepudiationHide Activities
Often the actions performed by injected control code are unlogged.
Mitigations (2)
RequirementsProgramming languages and supporting technologies might be chosen which are not subject to these issues.
ImplementationUtilize an appropriate mix of allowlist and denylist parsing to filter control-plane syntax from all input.
Examples (2)
This example code intends to take the name of a user and list the contents of that user's home directory. It is subject to the first variant of OS command injection.
$userName = $_POST["user"]; $command = 'ls -l /home/' . $userName; system($command);
Bad · PHP
;rm -rf /
Attack
The following code segment reads the name of the author of a weblog entry, author, from an HTTP request and sets it in a cookie header of an HTTP response.
String author = request.getParameter(AUTHOR_PARAM); ... Cookie cookie = new Cookie("author", author); cookie.setMaxAge(cookieExpiration); response.addCookie(cookie);
Bad · Java
HTTP/1.1 200 OK ... Set-Cookie: author=Jane Smith ...
Result
CVE IDTitleCVSSSeverityPublished
CVE-2023-33234 Apache Airflow CNCF Kubernetes Provider: KubernetesPodOperator RCE via connection configuration — Apache Airflow CNCF Kubernetes Provider 4.9 -2023-05-30
CVE-2023-32679 Remote Code Execution via unrestricted file extension in Craft CMS — cms 7.2 High2023-05-19
CVE-2023-32314 Sandbox Escape — vm2 9.8 Critical2023-05-15
CVE-2023-32313 Inspect method manipulation in vm2 — vm2 5.3 Medium2023-05-15
CVE-2022-45048 Apache Ranger: code execution vulnerability in policy expressions — Apache Ranger 8.4 High2023-05-05
CVE-2022-45801 Apache StreamPark (incubating): LDAP Injection Vulnerability — Apache StreamPark (incubating) 9.1 -2023-05-01
CVE-2023-30609 matrix-react-sdk vulnerable to HTML injection in search results via plaintext message highlighting — matrix-react-sdk 5.4 Medium2023-04-25
CVE-2023-29007 Arbitrary configuration injection via `git submodule deinit` — git 7.0 High2023-04-25
CVE-2023-29516 Code injection from view right on XWiki.AttachmentSelector in xwiki-platform — xwiki-platform 9.9 Critical2023-04-18
CVE-2023-29514 Code injection in template provider administration in xwiki-platform — xwiki-platform 10.0 Critical2023-04-18
CVE-2023-29512 Code injection in xwiki-platform-web-templates — xwiki-platform 9.9 Critical2023-04-18
CVE-2023-29510 Code injection via unescaped translations in xwiki-platform — xwiki-platform 10.0 Critical2023-04-18
CVE-2023-29522 Code injection from view right on XWiki.ClassSheet in xwiki-platform — xwiki-platform 9.9 Critical2023-04-18
CVE-2023-29521 Code injection from account/view through VFS Tree macro in xwiki-platform — xwiki-platform 8.4 High2023-04-18
CVE-2023-29519 Code injection in org.xwiki.platform:xwiki-platform-attachment-ui — xwiki-platform 9.1 Critical2023-04-18
CVE-2023-29518 Code injection from view right using Invitation.InvitationCommon in xwiki-platform — xwiki-platform 9.9 Critical2023-04-18
CVE-2023-29523 Code injection in display method used in user profiles in xwiki-platform — xwiki-platform 10.0 Critical2023-04-18
CVE-2023-29524 Code injection from account through XWiki.SchedulerJobSheet in xwiki-platform — xwiki-platform 10.0 Critical2023-04-18
CVE-2023-29525 Privilege escalation from view right on XWiki.Notifications.Code.LegacyNotificationAdministration in xwiki-platform — xwiki-platform 10.0 Critical2023-04-18
CVE-2023-29526 Async and display macro allow displaying and interacting with any document in restricted mode — xwiki-platform 10.0 Critical2023-04-18
CVE-2023-29527 Code injection from account through AWM view sheet in xwiki platform — xwiki-platform 10.0 Critical2023-04-18
CVE-2023-30547 Sandbox Escape in vm2 — vm2 9.8 Critical2023-04-17
CVE-2023-29213 org.xwiki.platform:xwiki-platform-logging-ui Injection vulnerability — xwiki-platform 9.1 Critical2023-04-17
CVE-2022-43769 Hitachi Vantara Pentaho Business Analytics Server - Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) — Pentaho Business Analytics Server 8.8 High2023-04-03
CVE-2023-28637 DataEase AWS redshift data source exists for remote code execution vulnerability — dataease 8.0 High2023-03-28
CVE-2023-26493 Command Injection in Cocos Engine workflow — cocos-engine 8.1 High2023-03-27
CVE-2023-25616 Code Injection vulnerability in SAP Business Objects Business Intelligence Platform (CMC) — Business Objects Business Intelligence Platform (CMC) 9.9 Critical2023-03-14
CVE-2023-1287 ENOVIA Live Collaboration V6R2013xE is affected by an XSL template injection vulnerability — ENOVIA Live Collaboration 9.0 Critical2023-03-09
CVE-2023-27479 Improper Neutralization of Directives in Dynamically Evaluated Code in org.xwiki.platform:xwiki-platform-panels-ui — xwiki-platform 10.0 Critical2023-03-07
CVE-2023-25613 LDAP Injection Vulnerability in Apache Kerby — Apache Kerby LDAP Backend 9.8 -2023-02-20

Vulnerabilities classified as CWE-74 (输出中的特殊元素转义处理不恰当(注入)) represent 375 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.