目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-78 OS命令中使用的特殊元素转义处理不恰当(OS命令注入) 类漏洞列表 2770

CWE-78 OS命令中使用的特殊元素转义处理不恰当(OS命令注入) 类弱点 2770 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-78即操作系统命令注入,属于输入验证缺陷。攻击者通过构造包含特殊字符的恶意输入,诱导程序拼接出非预期的系统命令,从而在服务器上执行任意代码。开发者应避免直接使用用户输入拼接命令,转而采用白名单过滤、参数化调用或安全API,确保外部数据仅作为参数而非命令结构的一部分,从根本上阻断注入路径。

MITRE CWE 官方描述
CWE:CWE-78 OS命令中特殊元素的不当中和('OS Command Injection') 英文:产品使用来自上游组件的外部影响输入来构建OS命令的全部或部分内容,但在将命令发送给下游组件时,未对可能修改预期OS命令的特殊元素进行中和或进行了错误的中和。 这种弱点可能导致在攻击者无法直接访问操作系统的环境中产生漏洞,例如在Web应用程序中。或者,如果该弱点出现在特权程序中,它可能允许攻击者指定通常无法访问的命令,或以攻击者不具备的特权调用备用命令。如果受影响的进程不遵循最小特权原则,问题会进一步加剧,因为攻击者控制的命令可能会以特殊的系统特权运行,从而增加损害程度。OS命令注入至少有两种子类型:应用程序意图执行一个单一的、固定的、由其自身控制程序。它意图使用外部提供的输入作为该程序的参数。例如,程序可能使用 system("nslookup [HOSTNAME]") 来运行 nslookup 并允许用户提供一个 HOSTNAME,该 HOSTNAME 用作参数。攻击者无法阻止 nslookup 的执行。然而,如果程序未从 HOSTNAME 参数中移除命令分隔符,攻击者可以将分隔符放入参数中,从而允许他们在 nslookup 执行完毕后执行自己的程序。应用程序接受一个输入,该输入用于完全选择要运行的程序以及要使用的命令。应用程序只是将整个命令重定向到操作系统。例如,程序可能使用 "exec([COMMAND])" 来执行由用户提供的 [COMMAND]。如果 COMMAND 处于攻击者控制之下,那么攻击者可以执行任意命令或程序。如果使用 exec() 和 CreateProcess() 等函数执行命令,攻击者可能无法在同一行中组合多个命令。从弱点角度来看,这些变体代表了不同的程序员错误。在第一种变体中,程序员显然意图让来自不受信任方的输入成为要执行的命令中的参数的一部分。在第二种变体中,程序员无意让命令对任何不受信任的方开放,但程序员可能未考虑到恶意攻击者提供输入的其他方式。
常见影响 (1)
Confidentiality, Integrity, Availability, Non-RepudiationExecute Unauthorized Code or Commands, DoS: Crash, Exit, or Restart, Read Files or Directories, Modify Files or Directories, Read Application Data, Modify Application Data, Hide Activities
Attackers could execute unauthorized operating system commands, which could then be used to disable the product, or read and modify data for which the attacker does not have permissions to access directly. Since the targeted application is directly executing the commands instead of the attacker, any…
缓解措施 (5)
Architecture and DesignIf at all possible, use library calls rather than external processes to recreate the desired functionality.
Architecture and Design, OperationRun the code in a "jail" or similar sandbox environment that enforces strict boundaries between the process and the operating system. This may effectively restrict which files can be accessed in a particular directory or which commands can be executed by the software. OS-level examples include the Unix chroot jail, AppArmor, and SELinux. In general, managed code may provide some protection. For ex…
Effectiveness: Limited
Architecture and DesignFor any data that will be used to generate a command to be executed, keep as much of that data out of external control as possible. For example, in web applications, this may require storing the data locally in the session's state instead of sending it out to the client in a hidden form field.
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, consider using the ESAPI Encoding control [REF-45] or a similar tool, library, or framework. These will help the programmer encode outputs in a manner less prone to error.
代码示例 (2)
This example code intends to take the name of a user and list the contents of that user's home directory. It is subject to the first variant of OS command injection.
$userName = $_POST["user"]; $command = 'ls -l /home/' . $userName; system($command);
Bad · PHP
;rm -rf /
Attack
The following simple program accepts a filename as a command line argument and displays the contents of the file back to the user. The program is installed setuid root because it is intended for use as a learning tool to allow system administrators in-training to inspect privileged system files without giving them the ability to modify them or damage the system.
int main(int argc, char** argv) { char cmd[CMD_MAX] = "/usr/bin/cat "; strcat(cmd, argv[1]); system(cmd); }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2025-53695 Johnson Controls iSTAR Ultra 安全漏洞 — iSTAR Ultra 8.8AIHighAI2025-07-28
CVE-2025-8259 Vaelsys V4 命令注入漏洞 — VaelsysV4 7.3 High2025-07-28
CVE-2023-53158 gix-transport crate 操作系统命令注入漏洞 — gix-transport 4.1 Medium2025-07-28
CVE-2025-54415 dag-factory 操作系统命令注入漏洞 — dag-factory 9.8 -2025-07-26
CVE-2014-125118 eScan Web Management Console 安全漏洞 — eScan Web Management Console 8.8 -2025-07-25
CVE-2019-25224 WordPress plugin WP Database Backup 操作系统命令注入漏洞 — WP Database Backup – Unlimited Database & Files Backup by Backup for WP 9.8 Critical2025-07-25
CVE-2025-29631 Gardyn 4安全漏洞 — Home Kit Firmware 9.8 Critical2025-07-25
CVE-2025-7404 Calibre-Web 操作系统命令注入漏洞 — Calibre Web 9.8 -2025-07-24
CVE-2015-10141 Xdebug 安全漏洞 — Xdebug 9.8 -2025-07-23
CVE-2025-41684 Weidmueller多款产品 操作系统命令注入漏洞 — IE-SR-2TX-WL 8.8 High2025-07-23
CVE-2025-41683 Weidmueller多款产品 操作系统命令注入漏洞 — IE-SR-2TX-WL 8.8 High2025-07-23
CVE-2024-53286 Synology Router Manager 操作系统命令注入漏洞 — Synology Router Manager (SRM) 7.2 High2025-07-23
CVE-2025-43020 HP Poly Clariti Manager devices 操作系统命令注入漏洞 — Poly Clariti Manager 7.2 -2025-07-22
CVE-2025-54072 yt-dlp 操作系统命令注入漏洞 — yt-dlp 7.5 High2025-07-22
CVE-2025-7724 VIGI NVR1104H-4P V1 1.1.5 Build 250518和VIGI NVR2016H-16MP V2 1.3.1 Build 250407 操作系统命令注入漏洞 — VIGI NVR1104H-4P V1 9.8 -2025-07-22
CVE-2025-7723 VIGI NVR1104H-4P V1 1.1.5 Build 250518和VIGI NVR2016H-16MP V2 1.3.1 Build 250407 操作系统命令注入漏洞 — VIGI NVR1104H-4P V1 8.8 -2025-07-22
CVE-2025-53472 ELECOM WRC-BE36QS-B和ELECOM WRC-W701-B 操作系统命令注入漏洞 — WRC-BE36QS-B 7.2 High2025-07-22
CVE-2025-7382 Sophos Firewall 安全漏洞 — Sophos Firewall 8.8 High2025-07-21
CVE-2025-6704 Sophos Firewall 安全漏洞 — Sophos Firewall 9.8 Critical2025-07-21
CVE-2025-41675 MB Connect Line mbNET.mini 操作系统命令注入漏洞 — mbNET.mini 7.2 High2025-07-21
CVE-2025-41674 MB Connect Line mbNET.mini 操作系统命令注入漏洞 — mbNET.mini 7.2 High2025-07-21
CVE-2025-41673 MB Connect Line mbNET.mini 操作系统命令注入漏洞 — mbNET.mini 7.2 High2025-07-21
CVE-2025-54314 Thor 操作系统命令注入漏洞 — Thor 2.8 Low2025-07-20
CVE-2025-7788 xxl-job 命令注入漏洞 — xxl-job 6.3 Medium2025-07-18
CVE-2025-34132 LILIN Digital Video Recorder 安全漏洞 — DVR Firmware 9.8AICriticalAI2025-07-16
CVE-2025-34129 LILIN Digital Video Recorder 安全漏洞 — DVR Firmware 7.2AIHighAI2025-07-16
CVE-2025-34125 D-Link DSP-W110A1 安全漏洞 — DSP-W110A1 9.8AICriticalAI2025-07-16
CVE-2025-34103 Barco WePresent WiPG-1000 安全漏洞 — WiPG-1000 9.8AICriticalAI2025-07-15
CVE-2025-34115 ITRS Group OP5 Monitor 安全漏洞 — OP5 Monitor 8.8AIHighAI2025-07-15
CVE-2025-34116 IPFire 安全漏洞 — IPFire 8.8AIHighAI2025-07-15

CWE-78(OS命令中使用的特殊元素转义处理不恰当(OS命令注入)) 是常见的弱点类别,本平台收录该类弱点关联的 2770 条 CVE 漏洞。