Failure to Sanitize Server-Side Includes (SSI) Within a Web Page |
Weakness ID: 97 (Weakness Base) | Status: Draft |
Description Summary
Phase: Implementation Utilize an appropriate mix of white-list and black-list parsing to filter server-side include syntax from all input. |
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ChildOf | Weakness Base | 96 | Improper Sanitization of Directives in Statically Saved Code ('Static Code Injection') | Development Concepts (primary)699 Research Concepts (primary)1000 |
This can be resultant from XSS/HTML injection because the same special characters can be involved. However, this is server-side code execution, not client-side. |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Server-Side Includes (SSI) Injection | ||
WASC | 36 | SSI Injection |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Other Notes, Taxonomy Mappings | ||||
2009-10-29 | CWE Content Team | MITRE | Internal | |
updated Other Notes, Relationship Notes | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-04-11 | Server-Side Includes (SSI) Injection | |||
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.
28 June 2016