Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-76 (等价特殊元素的转义处理不恰当) — Vulnerability Class 9

9 vulnerabilities classified as CWE-76 (等价特殊元素的转义处理不恰当). AI Chinese analysis included.

CWE-76 represents a logic flaw where software filters specific special characters but fails to account for their equivalent representations, such as alternate encodings or case variations. Attackers exploit this oversight by substituting blocked characters with functionally identical alternatives, thereby bypassing input validation mechanisms. For instance, if a system blocks forward slashes to prevent path traversal but ignores double slashes or encoded variants, an adversary can inject malicious paths that the application interprets as valid. To mitigate this vulnerability, developers must implement comprehensive normalization strategies that resolve all equivalent forms before validation. This involves canonicalizing input data to a single standard representation and ensuring that filtering logic accounts for all possible encodings, including Unicode variations and URL encoding, rather than relying on static lists of prohibited characters.

MITRE CWE Description
The product correctly neutralizes certain special elements, but it improperly neutralizes equivalent special elements. The product may have a fixed list of special characters it believes is complete. However, there may be alternate encodings, or representations that also have the same meaning. For example, the product may filter out a leading slash (/) to prevent absolute path names, but does not account for a tilde (~) followed by a user name, which on some *nix systems could be expanded to an absolute pathname. Alternately, the product might filter a dangerous "-e" command-line switch when calling an external program, but it might not account for "--exec" or other switches that have the same semantics.
Common Consequences (1)
OtherOther
Mitigations (2)
RequirementsProgramming languages and supporting technologies might be chosen which are not subject to these issues.
ImplementationUtilize an appropriate mix of allowlist and denylist parsing to filter equivalent special element syntax from all input.

Vulnerabilities classified as CWE-76 (等价特殊元素的转义处理不恰当) represent 9 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.