CWE-24 – Path Traversal: ‘../filedir’

Read Time:36 Second

Description

The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize “../” sequences that can resolve to a location that is outside of that directory.

Modes of Introduction:

– Architecture and Design

 

 

Related Weaknesses

CWE-23

 

Consequences

Confidentiality, Integrity: Read Files or Directories, Modify Files or Directories

 

Potential Mitigations

Phase: Implementation

Description: 

Phase: Implementation

Description: 

Inputs should be decoded and canonicalized to the application’s current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.

CVE References

CWE-239 – Failure to Handle Incomplete Element

Read Time:31 Second

Description

The software does not properly handle when a particular element is not completely specified.

Modes of Introduction:

– Architecture and Design

 

 

Related Weaknesses

CWE-237
CWE-404

 

Consequences

Integrity, Other: Varies by Context, Unexpected State

 

Potential Mitigations

CVE References

  • CVE-2002-1532
    • HTTP GET without rnrn CRLF sequences causes product to wait indefinitely and prevents other users from accessing it.
  • CVE-2005-2526
    • MFV. CPU exhaustion in printer via partial printing request then early termination of connection.
  • CVE-2002-1906
    • CPU consumption by sending incomplete HTTP requests and leaving the connections open.

CWE-236 – Improper Handling of Undefined Parameters

Read Time:24 Second

Description

The software does not handle or incorrectly handles when a particular parameter, field, or argument name is not defined or supported by the product.

Modes of Introduction:

– Architecture and Design

 

 

Related Weaknesses

CWE-233

 

Consequences

Integrity: Unexpected State

 

Potential Mitigations

CVE References

  • CVE-2002-1488
    • Crash in IRC client via PART message from a channel the user is not in.
  • CVE-2001-0650
    • Router crash or bad route modification using BGP updates with invalid transitive attribute.

CWE-235 – Improper Handling of Extra Parameters

Read Time:21 Second

Description

The software does not handle or incorrectly handles when the number of parameters, fields, or arguments with the same name exceeds the expected amount.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-233

 

Consequences

Integrity: Unexpected State

 

Potential Mitigations

CVE References

  • CVE-2003-1014
    • MIE. multiple gateway/security products allow restriction bypass using multiple MIME fields with the same name, which are interpreted differently by clients.

CWE-234 – Failure to Handle Missing Parameter

Read Time:2 Minute, 21 Second

Description

If too few arguments are sent to a function, the function will still pop the expected number of arguments from the stack. Potentially, a variable number of arguments could be exhausted in a function as well.

Modes of Introduction:

– Architecture and Design

 

Likelihood of Exploit: High

 

Related Weaknesses

CWE-233

 

Consequences

Integrity, Confidentiality, Availability, Access Control: Execute Unauthorized Code or Commands, Gain Privileges or Assume Identity

There is the potential for arbitrary code execution with privileges of the vulnerable program if function parameter list is exhausted.

Availability: DoS: Crash, Exit, or Restart

Potentially a program could fail if it needs more arguments then are available.

 

Potential Mitigations

Phase: Build and Compilation

Description: 

This issue can be simply combated with the use of proper build process.

Phase: Implementation

Description: 

Forward declare all functions. This is the recommended solution. Properly forward declaration of all used functions will result in a compiler error if too few arguments are sent to a function.

CVE References

  • CVE-2004-0276
    • Server earlier allows remote attackers to cause a denial of service (crash) via an HTTP request with a sequence of “%” characters and a missing Host field.
  • CVE-2002-1488
    • Chat client allows remote malicious IRC servers to cause a denial of service (crash) via a PART message with (1) a missing channel or (2) a channel that the user is not in.
  • CVE-2002-1169
    • Proxy allows remote attackers to cause a denial of service (crash) via an HTTP request to helpout.exe with a missing HTTP version numbers.
  • CVE-2000-0521
    • Web server allows disclosure of CGI source code via an HTTP request without the version number.
  • CVE-2001-0590
    • Application server allows a remote attacker to read the source code to arbitrary ‘jsp’ files via a malformed URL request which does not end with an HTTP protocol specification.
  • CVE-2003-0239
    • Chat software allows remote attackers to cause a denial of service via malformed GIF89a headers that do not contain a GCT (Global Color Table) or an LCT (Local Color Table) after an Image Descriptor.
  • CVE-2002-1023
    • Server allows remote attackers to cause a denial of service (crash) via an HTTP GET request without a URI.
  • CVE-2002-1531
    • Crash in HTTP request without a Content-Length field.
  • CVE-2002-1077
    • Crash in HTTP request without a Content-Length field.
  • CVE-2002-1358
    • Empty elements/strings in protocol test suite affect many SSH2 servers/clients.
  • CVE-2003-0477
    • FTP server crashes in PORT command without an argument.
  • CVE-2002-0107
    • Resultant infoleak in web server via GET requests without HTTP/1.0 version string.
  • CVE-2002-0596
    • GET request with empty parameter leads to error message infoleak (path disclosure).

CWE-232 – Improper Handling of Undefined Values

Read Time:17 Second

Description

The software does not handle or incorrectly handles when a value is not defined or supported for the associated parameter, field, or argument name.

Modes of Introduction:

– Architecture and Design

 

 

Related Weaknesses

CWE-229

 

Consequences

Integrity: Unexpected State

 

Potential Mitigations

CVE References

  • CVE-2000-1003
    • Client crash when server returns unknown driver type.

News, Advisories and much more

Exit mobile version