logo
Home/CWEs/CWE-184/

CWE-184 - Incomplete List of Disallowed Inputs

  • Abstraction:Base
  • Structure:Simple
  • Status:Draft
  • Release Date:2006-07-19
  • Latest Modification Date:2024-11-19

Weakness Name

Incomplete List of Disallowed Inputs

Description

The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete.

Common Consequences

Scope: Access Control

Impact: Bypass Protection Mechanism

Notes: Attackers may be able to find other malicious inputs that were not expected by the developer, allowing them to bypass the intended protection mechanism.

Related Weaknesses

CWE-78Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')High

CWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')High

CWE-98Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')High

CWE-434Unrestricted Upload of File with Dangerous TypeMedium

CWE-693Protection Mechanism Failure

CWE-1023Incomplete Comparison with Missing Factors