CWE-624: Executable Regular Expression Error

ID CWE-624
Abstraction Base
Structure Simple
Status Incomplete
Number of CVEs 1
The product uses a regular expression that either (1) contains an executable component with user-controlled inputs, or (2) allows a user to enable execution by inserting pattern modifiers.

Case (2) is possible in the PHP preg_replace() function, and possibly in other languages when a user-controlled input is inserted into a string that is later parsed as a regular expression.

Modes of Introduction

Phase Note
Implementation

Applicable Platforms

Type Class Name Prevalence
Language PHP
Language Perl

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-1000 Research Concepts Draft CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') Class Simple Draft
CWE-1305 CISQ Quality Measures (2020) Incomplete CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') Class Simple Draft
CWE-1340 CISQ Data Protection Measures Incomplete CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') Class Simple Draft

CVEs Published

CVSS Severity

CVSS Severity - By Year

CVSS Base Score

# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...
Loading...