CWE-624 - Executable Regular Expression Error
CWE-624
- Abstraction:
- Base
- Structure:
- Simple
- Status:
- Incomplete
- Weakness Name
Executable Regular Expression Error
- Description
The product uses a regular expression that either (1) contains an executable component with user-controlled inputs, or (2) allows a user to enable execution by inserting pattern modifiers.
Case (2) is possible in the PHP preg_replace() function, and possibly in other languages when a user-controlled input is inserted into a string that is later parsed as a regular expression.
- Common Consequences
Scope: Confidentiality, Integrity, Availability
Impact: Execute Unauthorized Code or Commands
- Related Weaknesses
- Release Date:
- 2007-05-07
- Latest Modification Date:
- 2023-06-29
Free security scan for your website