目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-77 在命令中使用的特殊元素转义处理不恰当(命令注入) 类漏洞列表 1183

CWE-77 在命令中使用的特殊元素转义处理不恰当(命令注入) 类弱点 1183 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-77即命令注入,属于输入验证缺陷。攻击者通过构造包含特殊字符的恶意输入,篡改后端系统命令,从而执行任意指令或获取敏感数据。开发者应避免直接拼接用户输入,需采用白名单过滤、参数化调用或安全API替代系统命令执行,确保输入被严格限制在预期范围内,从源头阻断注入风险。

MITRE CWE 官方描述
CWE:CWE-77 命令注入(Command Injection)中特殊元素的不当中和 英文:产品使用来自上游组件的外部影响输入来构造命令的全部或部分内容,但在将命令发送给下游组件时,未对可能修改预期命令的特殊元素进行中和,或中和不当。 许多协议和产品拥有其自定义的命令语言。尽管操作系统(OS)或 Shell 命令字符串常被发现并作为攻击目标,但开发人员可能未意识到这些其他命令语言也可能易受攻击。
常见影响 (1)
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
If a malicious user injects a character (such as a semi-colon) that delimits the end of one command and the beginning of another, it may be possible to then insert an entirely new and unrelated command that was not intended to be executed. This gives an attacker a privilege or capability that they w…
缓解措施 (5)
Architecture and DesignIf at all possible, use library calls rather than external processes to recreate the desired functionality.
ImplementationIf possible, ensure that all external commands called from the program are statically created.
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
OperationRun time: Run time policy enforcement may be used in an allowlist fashion to prevent use of any non-sanctioned commands.
System ConfigurationAssign permissions that prevent the user from accessing/opening privileged files.
代码示例 (2)
Consider a "CWE Differentiator" application that uses an an LLM generative AI based "chatbot" to explain the difference between two weaknesses. As input, it accepts two CWE IDs, constructs a prompt string, sends the prompt to the chatbot, and prints the results. The prompt string effectively acts as a command to the chatbot component. Assume that invokeChatbot() calls the chatbot and returns the …
prompt = "Explain the difference between {} and {}".format(arg1, arg2) result = invokeChatbot(prompt) resultHTML = encodeForHTML(result) print resultHTML
Bad · Python
Explain the difference between CWE-77 and CWE-78
Informative
Consider the following program. It intends to perform an "ls -l" on an input filename. The validate_name() subroutine performs validation on the input to make sure that only alphanumeric and "-" characters are allowed, which avoids path traversal (CWE-22) and OS command injection (CWE-78) weaknesses. Only filenames like "abc" or "d-e-f" are intended to be allowed.
my $arg = GetArgument("filename"); do_listing($arg); sub do_listing { my($fname) = @_; if (! validate_name($fname)) { print "Error: name is not well-formed!\n"; return; } # build command my $cmd = "/bin/ls -l $fname"; system($cmd); } sub validate_name { my($name) = @_; if ($name =~ /^[\w\-]+$/) { return(1); } else { return(0); } }
Bad · Perl
if ($name =~ /^\w[\w\-]+$/) ...
Good · Perl
CVE ID标题CVSS风险等级Published
CVE-2026-42453 Termix extractArchive/compressFiles 命令注入漏洞 — Termix--2026-05-08
CVE-2026-42271 LiteLLM MCP stdio测试端点命令执行漏洞 — litellm--2026-05-08
CVE-2026-41500 electerm 通过 runMac 函数实现命令注入漏洞 — electerm 9.8 Critical2026-05-08
CVE-2026-41501 electerm runLinux命令注入漏洞 — electerm 9.8 Critical2026-05-08
CVE-2026-35428 Azure Cloud Shell 伪造漏洞 — Azure Cloud Shell 9.6 Critical2026-05-07
CVE-2026-33111 Copilot Chat (Microsoft Edge) 信息泄露漏洞 — Copilot Chat (Microsoft Edge) 7.5 High2026-05-07
CVE-2026-20169 思科IoT Field Network Director 命令注入漏洞 — Cisco IoT Field Network Director (IoT-FND) 6.4 Medium2026-05-06
CVE-2025-31951 HCL BigFix RunBookAI 未验证命令输入漏洞 — BigFix RunBookAI 8.8 High2026-05-06
CVE-2026-7833 ipTIME C200 ApplyRestore iux_set.cgi 命令注入漏洞 — ipTIME C200 7.2 High2026-05-05
CVE-2026-7812 MCP Tool server.py git_operation 命令注入漏洞 — code-mcp 7.3 High2026-05-05
CVE-2026-7721 Totolink WA300 cstecgi.cgi NTP同步命令注入漏洞 — WA300 6.3 Medium2026-05-04
CVE-2026-7720 Totolink WA300 CSTECGI.cgi 命令注入漏洞 — WA300 6.3 Medium2026-05-04
CVE-2026-7718 Totolink WA300 cstecgi.cgi命令注入漏洞 — WA300 6.3 Medium2026-05-04
CVE-2026-7705 JD Cloud JDCOS 服务 jdcap set_iptv_info 命令注入漏洞 — JDCOS 6.3 Medium2026-05-03
CVE-2026-7692 Wavlink WL-WN570HA1 adm.cgi ping_ddns 命令注入漏洞 — WL-WN570HA1 6.3 Medium2026-05-03
CVE-2026-7691 Wavlink WL-WN570HA1 adm.cgi命令注入漏洞 — WL-WN570HA1 6.3 Medium2026-05-03
CVE-2026-7690 Wavlink WL-WN570HA1 后台命令注入漏洞 — WL-WN570HA1 6.3 Medium2026-05-03
CVE-2026-7687 Langflow command injection in code_parser.py — langflow 6.3 Medium2026-05-03
CVE-2026-7683 Edimax BR-6428nC Web setWAN命令注入漏洞 — BR-6428nC 6.3 Medium2026-05-03
CVE-2026-7682 Edimax BR-6208AC L2TP模式设置WAN命令注入漏洞 — BR-6208AC 6.3 Medium2026-05-03
CVE-2026-7629 awesome-cursor-mpc-server runCodeReviewTool 命令注入 — awesome-cursor-mpc-server 6.3 Medium2026-05-02
CVE-2026-7628 Repomix 1.6.5 命令注入漏洞 — mcp-code-review-server 6.3 Medium2026-05-02
CVE-2026-7548 Totolink NR1800X cstecgi.cgi命令注入漏洞 — NR1800X 8.8 High2026-05-01
CVE-2026-7469 Tenda 4G300 DelFil 命令注入漏洞 — 4G300 6.3 Medium2026-04-30
CVE-2026-26015 DocsGPT 命令注入漏洞 — DocsGPT 8.8AIHighAI2026-04-29
CVE-2026-7316 MyMCP 注入漏洞 — aider-mcp 7.3 High2026-04-28
CVE-2026-7215 MCP-GMX-VMD 注入漏洞 — gmx-vmd-mcp 7.3 High2026-04-28
CVE-2026-7211 MCP Server with OpenAI, Git, Filesystem, and Prometheus Integration 注入漏洞 — MCP 7.3 High2026-04-28
CVE-2026-7160 Tenda HG3 注入漏洞 — HG3 8.8 High2026-04-27
CVE-2026-7157 Aider MCP Server 注入漏洞 — aider-mcp-server 7.3 High2026-04-27

CWE-77(在命令中使用的特殊元素转义处理不恰当(命令注入)) 是常见的弱点类别,本平台收录该类弱点关联的 1183 条 CVE 漏洞。