Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-790 (特殊元素过滤不恰当) — Vulnerability Class 10

10 vulnerabilities classified as CWE-790 (特殊元素过滤不恰当). AI Chinese analysis included.

CWE-790 represents a critical input validation weakness where software fails to properly sanitize special characters or structural elements before processing data from untrusted sources. This flaw typically enables attackers to inject malicious payloads, such as cross-site scripting scripts or command injection sequences, by bypassing inadequate filtering mechanisms. When these unfiltered elements reach downstream components like interpreters or databases, they can alter execution logic, leading to data breaches, system compromise, or unauthorized access. Developers mitigate this risk by implementing rigorous input validation strategies, specifically employing allow-listing techniques to reject unexpected characters. Furthermore, utilizing parameterized queries and context-aware encoding ensures that special elements are treated as data rather than executable code, effectively neutralizing injection attempts and maintaining the integrity of the application’s processing pipeline.

MITRE CWE Description
The product receives data from an upstream component, but does not filter or incorrectly filters special elements before sending it to a downstream component.
Common Consequences (1)
IntegrityUnexpected State
Examples (1)
The following code takes untrusted input and uses a regular expression to filter "../" from the input. It then appends this result to the /home/user/ directory and attempts to read the file in the final resulting path.
my $Username = GetUntrustedInput(); $Username =~ s/\.\.\///; my $filename = "/home/user/" . $Username; ReadAndSendFile($filename);
Bad · Perl
../../../etc/passwd
Attack

Vulnerabilities classified as CWE-790 (特殊元素过滤不恰当) represent 10 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.