CWE-181: Incorrect Behavior Order: Validate Before Filter
ID
CWE-181
Abstraction
Variant
Structure
Simple
Status
Draft
The product validates data before it has been filtered, which prevents the product from detecting data that becomes invalid after the filtering step.
This can be used by an attacker to bypass the validation and launch attacks that expose weaknesses that would otherwise be prevented, such as injection.
Modes of Introduction
Phase | Note |
---|---|
Implementation |
Applicable Platforms
Type | Class | Name | Prevalence |
---|---|---|---|
Language | Not Language-Specific |
Common Attack Pattern Enumeration and Classification (CAPEC)
The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.
CAPEC at Mitre.org# ID | Name | Weaknesses |
---|---|---|
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters | CWE-181 |
CAPEC-43 | Exploiting Multiple Input Interpretation Layers | CWE-181 |
CAPEC-78 | Using Escaped Slashes in Alternate Encoding | CWE-181 |
CAPEC-79 | Using Slashes in Alternate Encoding | CWE-181 |
CAPEC-80 | Using UTF-8 Encoding to Bypass Validation Logic | CWE-181 |
CAPEC-120 | Double Encoding | CWE-181 |
CAPEC-267 | Leverage Alternate Encoding | CWE-181 |
Loading...