2722 vulnerabilities classified as CWE-78 (OS命令中使用的特殊元素转义处理不恰当(OS命令注入)). AI Chinese analysis included.
CWE-78 represents a critical input validation weakness where software constructs operating system commands using untrusted external data without proper sanitization. Attackers typically exploit this by injecting malicious shell metacharacters, such as semicolons or pipes, into user-supplied fields like form inputs or URL parameters. This manipulation allows the attacker to alter the intended command structure, enabling arbitrary code execution, data exfiltration, or complete system compromise. To mitigate this risk, developers must strictly avoid passing user input directly to OS command interpreters. Instead, they should utilize safe, language-specific APIs that do not invoke the shell, or implement rigorous input validation and parameterization techniques. By treating all external data as inherently untrusted and applying strict allow-list filtering, organizations can effectively neutralize special elements and prevent command injection vulnerabilities.
$userName = $_POST["user"]; $command = 'ls -l /home/' . $userName; system($command);;rm -rf /int main(int argc, char** argv) { char cmd[CMD_MAX] = "/usr/bin/cat "; strcat(cmd, argv[1]); system(cmd); }Vulnerabilities classified as CWE-78 (OS命令中使用的特殊元素转义处理不恰当(OS命令注入)) represent 2722 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.