目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-94 对生成代码的控制不恰当(代码注入) 类漏洞列表 1335

CWE-94 对生成代码的控制不恰当(代码注入) 类弱点 1335 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-94 指代码注入漏洞,属于输入验证缺陷。攻击者通过向程序提供恶意构造的外部输入,利用未正确过滤的特殊字符或代码片段,篡改预期代码逻辑或注入可执行指令,从而劫持系统控制权。开发者应避免直接拼接用户输入,采用白名单验证机制,并使用参数化查询或沙箱环境隔离执行上下文,确保输入数据的合法性与安全性,从根本上阻断恶意代码的注入路径。

MITRE CWE 官方描述
CWE:CWE-94 代码生成控制不当('Code Injection') 英文:产品使用来自上游组件的外部影响输入来构建代码段的全部或部分内容,但未对可能修改预期代码段语法或行为的特殊元素进行中和,或中和不正确。
常见影响 (4)
Access ControlBypass Protection Mechanism
In some cases, injectable code controls authentication; this may lead to a remote vulnerability.
Access ControlGain Privileges or Assume Identity
Injected code can access resources that the attacker is directly prevented from accessing.
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
When a product allows a user's input to contain code syntax, it might be possible for an attacker to craft the code in such a way that it will alter the intended control flow of the product. As a result, code injection can often result in the execution of arbitrary code. Code injection attacks can…
Non-RepudiationHide Activities
Often the actions performed by injected control code are unlogged.
缓解措施 (5)
Architecture and DesignRefactor your program so that you do not have to dynamically generate code.
Architecture and DesignRun your code in a "jail" or similar sandbox environment that enforces strict boundaries between the process and the operating system. This may effectively restrict which code can be executed by your product. Examples include the Unix chroot jail and AppArmor. In general, managed code may provide some protection. This may not be a feasible solution, and it only limits the impact to the operating s…
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
TestingUse dynamic tools and techniques that interact with the product using large test suites with many diverse inputs, such as fuzz testing (fuzzing), robustness testing, and fault injection. The product's operation may slow down, but it should not become unstable, crash, or generate incorrect results.
OperationRun the code in an environment that performs automatic taint propagation and prevents any command execution that uses tainted variables, such as Perl's "-T" switch. This will force the program to perform validation steps that remove the taint, although you must be careful to correctly validate your inputs so that you do not accidentally mark dangerous inputs as untainted (see CWE-183 and CWE-184).
代码示例 (2)
This example attempts to write user messages to a message file and allow users to view them.
$MessageFile = "messages.out"; if ($_GET["action"] == "NewMessage") { $name = $_GET["name"]; $message = $_GET["message"]; $handle = fopen($MessageFile, "a+"); fwrite($handle, "<b>$name</b> says '$message'<hr>\n"); fclose($handle); echo "Message Saved!<p>\n"; } else if ($_GET["action"] == "ViewMessages") { include($MessageFile); }
Bad · PHP
name=h4x0r message=%3C?php%20system(%22/bin/ls%20-l%22);?%3E
Attack
edit-config.pl: This CGI script is used to modify settings in a configuration file.
use CGI qw(:standard); sub config_file_add_key { my ($fname, $key, $arg) = @_; # code to add a field/key to a file goes here } sub config_file_set_key { my ($fname, $key, $arg) = @_; # code to set key to a particular file goes here } sub config_file_delete_key { my ($fname, $key, $arg) = @_; # code to delete key from a particular file goes here } sub handleConfigAction { my ($fname, $action) = @_; my $key = param('key'); my $val = param('val'); # this is super-efficient code, especially if you have to invoke # any one of dozens of different functions! my $code = "config_file_$action_key(\$fnam
Bad · Perl
add_key(",","); system("/bin/ls");
Attack
CVE ID标题CVSS风险等级Published
CVE-2023-25539 Dell NetWorker 操作系统命令注入漏洞 — NetWorker NVE 8.4 High2023-05-31
CVE-2023-32692 CodeIgniter 代码注入漏洞 — CodeIgniter4 9.8 Critical2023-05-30
CVE-2023-2928 Desdev DedeCMS 代码注入漏洞 — DedeCMS 6.3 Medium2023-05-27
CVE-2023-2943 OpenEMR 代码注入漏洞 — openemr/openemr 8.6 -2023-05-27
CVE-2023-33246 Apache RocketMQ 代码注入漏洞 — Apache RocketMQ 9.8 -2023-05-24
CVE-2023-2859 TeamPass 代码注入漏洞 — nilsteampassnet/teampass 9.4 -2023-05-24
CVE-2023-32697 SQLite 代码注入漏洞 — sqlite-jdbc 8.8 High2023-05-23
CVE-2023-24955 Microsoft SharePoint 安全漏洞 — Microsoft SharePoint Enterprise Server 2016 7.2 High2023-05-09
CVE-2023-2583 jsreport 代码注入漏洞 — jsreport/jsreport 7.3 -2023-05-08
CVE-2023-31415 Elastic Kibana 代码注入漏洞 — Kibana 9.9 -2023-05-04
CVE-2023-31414 Elastic Kibana 代码注入漏洞 — Kibana 9.1 -2023-05-04
CVE-2022-36963 SolarWinds Platform 代码注入漏洞 — SolarWinds Platform 7.2 High2023-04-21
CVE-2023-25550 Schneider Electric StruxureWare Data Center Expert 代码注入漏洞 — StruxureWare Data Center Expert 7.2 High2023-04-18
CVE-2023-25549 Schneider Electric StruxureWare Data Center Expert 代码注入漏洞 — StruxureWare Data Center Expert 7.2 High2023-04-18
CVE-2023-2056 Desdev DedeCMS 代码注入漏洞 — DedeCMS 6.3 Medium2023-04-14
CVE-2023-27897 SAP CRM 代码注入漏洞 — CRM 6.0 Medium2023-04-11
CVE-2023-1947 taoCMS 代码注入漏洞 — taoCMS 6.3 Medium2023-04-07
CVE-2023-28706 Apache Airflow 代码注入漏洞 — Apache Airflow Hive Provider 9.8 -2023-04-07
CVE-2023-26119 HtmlUnit 安全漏洞 — net.sourceforge.htmlunit:htmlunit 9.8 Critical2023-04-03
CVE-2023-1773 RockOA 代码注入漏洞 — Rockoa 6.3 Medium2023-03-31
CVE-2023-24835 SPAM SQR 代码注入漏洞 — SPAM SQR 7.2 High2023-03-27
CVE-2022-38745 Apache OpenOffice 安全漏洞 — Apache OpenOffice 9.8 -2023-03-24
CVE-2023-28333 Moodle 代码注入漏洞 9.8 -2023-03-23
CVE-2023-1306 InsightCloudSec 代码注入漏洞 — InsightCloudSec 8.8 -2023-03-21
CVE-2023-1304 InsightCloudSec 代码注入漏洞 — InsightCloudSec 8.8 -2023-03-21
CVE-2023-1482 HkCms 代码注入漏洞 — HkCms 4.7 Medium2023-03-18
CVE-2023-0598 GE iFIX 代码注入漏洞 — Proficy iFIX 7.8 High2023-03-16
CVE-2023-27893 SAP Solution Manager 代码注入漏洞 — Solution Manager and ABAP managed systems 8.8 High2023-03-14
CVE-2023-1367 Easy!Appointments 代码注入漏洞 — alextselegidis/easyappointments 3.8 -2023-03-13
CVE-2023-1283 qwik 代码注入漏洞 — builderio/qwik 10.0 Critical2023-03-08

CWE-94(对生成代码的控制不恰当(代码注入)) 是常见的弱点类别,本平台收录该类弱点关联的 1335 条 CVE 漏洞。