CWE-184 - Incomplete List of Disallowed Inputs
- Abstraction:Base
- Structure:Simple
- Status:Draft
- Release Date:2006-07-19
- Latest Modification Date:2024-11-19
Weakness Name
Incomplete List of Disallowed Inputs
Description
The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete.
Common Consequences
Scope: Access Control
Impact: Bypass Protection Mechanism
Notes: Attackers may be able to find other malicious inputs that were not expected by the developer, allowing them to bypass the intended protection mechanism.
Related Weaknesses
CWE-78Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')High
CWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')High
CWE-434Unrestricted Upload of File with Dangerous TypeMedium