CWE-777 - Regular Expression without Anchors
CWE-777 Medium
- Abstraction:
- Variant
- Structure:
- Simple
- Status:
- Incomplete
- Weakness Name
Regular Expression without Anchors
- Description
The product uses a regular expression to perform neutralization, but the regular expression is not anchored and may allow malicious or malformed data to slip through.
When performing tasks such as validating against a set of allowed inputs (allowlist), data is examined and possibly modified to ensure that it is well-formed and adheres to a list of safe values. If the regular expression is not anchored, malicious or malformed data may be included before or after any string matching the regular expression. The type of malicious data that is allowed will depend on the context of the application and which anchors are omitted from the regular expression.
- Common Consequences
Scope: Availability, Confidentiality, Access Control
Impact: Bypass Protection Mechanism
Notes: An unanchored regular expression in the context of an allowlist will possibly result in a protection mechanism failure, allowing malicious or malformed data to enter trusted regions of the program. The specific consequences will depend on what functionality the allowlist was protecting.
- Related Weaknesses
- Release Date:
- 2009-07-27
- Latest Modification Date:
- 2023-06-29
Free security scan for your website