148 vulnerabilities classified as CWE-88 (参数注入或修改). AI Chinese analysis included.
CWE-88 represents a critical input validation weakness where software constructs command strings without properly delimiting arguments, options, or switches intended for external components. This flaw typically arises when developers interpolate user-controlled data directly into command lines, mistakenly assuming that only specified arguments will be processed. Attackers exploit this by injecting additional arguments or switches that alter the command’s behavior, potentially leading to unauthorized code execution or privilege escalation. To mitigate this risk, developers must strictly validate and sanitize all inputs before inclusion in command strings. Best practices include using parameterized APIs that separate commands from arguments, avoiding shell interpreters when possible, and employing allowlists to restrict acceptable input formats. By ensuring robust argument separation and rigorous input filtering, organizations can effectively prevent attackers from manipulating command execution contexts and maintain system integrity against injection-based attacks.
my $arg = GetArgument("filename"); do_listing($arg); sub do_listing { my($fname) = @_; if (! validate_name($fname)) { print "Error: name is not well-formed!\n"; return; } # build command my $cmd = "/bin/ls -l $fname"; system($cmd); } sub validate_name { my($name) = @_; if ($name =~ /^[\w\-]+$/) { return(1); } else { return(0); } }if ($name =~ /^\w[\w\-]+$/) ...Vulnerabilities classified as CWE-88 (参数注入或修改) represent 148 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.