CWE-692: Incomplete Denylist to Cross-Site Scripting

ID CWE-692
Abstraction Compound
Structure Chain
Status Draft
Number of CVEs 2
The product uses a denylist-based protection mechanism to defend against XSS attacks, but the denylist is incomplete, allowing XSS variants to succeed.

While XSS might seem simple to prevent, web browsers vary so widely in how they parse web pages, that a denylist cannot keep track of all the variations. The "XSS Cheat Sheet" [REF-714] contains a large number of attacks that are intended to bypass incomplete denylists.

Applicable Platforms

Type Class Name Prevalence
Language Not Language-Specific

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-709 Named Chains Incomplete CWE-184 Incomplete List of Disallowed Inputs Base Simple Draft
CWE-1000 Research Concepts Draft CWE-184 Incomplete List of Disallowed Inputs Base Simple Draft

Common Attack Pattern Enumeration and Classification (CAPEC)

The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.

CAPEC at Mitre.org
# ID Name Weaknesses
CAPEC-71 Using Unicode Encoding to Bypass Validation Logic CWE-692
CAPEC-80 Using UTF-8 Encoding to Bypass Validation Logic CWE-692
CAPEC-85 AJAX Footprinting CWE-692
CAPEC-120 Double Encoding CWE-692
CAPEC-267 Leverage Alternate Encoding CWE-692

CVEs Published

CVSS Severity

CVSS Severity - By Year

CVSS Base Score

# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...
Loading...