SFP Secondary Cluster: Faulty Input Transformation
A category in the Common Weakness Enumeration published by The MITRE Corporation.
Categories in the Common Weakness Enumeration (CWE) group entries based on some common characteristic or attribute.
This category identifies Software Fault Patterns (SFPs) within the Faulty Input Transformation cluster.
The product filters data in a way that causes it to be reduced or "collapsed" into an unsafe value that violates an expected security property.
The product decodes the same input twice, which can limit the effectiveness of any protection mechanism that occurs in between the decoding operations.
The product does not properly encode or decode the data, resulting in unexpected values.
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a re...
The product receives input from an upstream component, but it does not handle or incorrectly handles when an additional unexpected special element is provided.
The product does not properly handle when an input uses an alternate encoding that is valid for the control sphere to which the input is being sent.
The product does not properly account for differences in case sensitivity when accessing or determining the properties of a resource, leading to inconsistent results.
The product does not properly handle input in which an inconsistency exists between two or more special characters or reserved words.
The product receives input from an upstream component, but it does not handle or incorrectly handles when an expected special element is missing.
The product does not properly handle when the same input uses several different (mixed) encodings.
The product does not properly handle when an input contains Unicode encoding.
The product does not properly handle when all or part of an input has been URL encoded.
The product validates input before applying protection mechanisms that modify the input, which could allow an attacker to bypass the validation via dangerous inputs th...
The product validates input before it is canonicalized, which prevents the product from detecting data that becomes invalid after the canonicalization step.
The product validates data before it has been filtered, which prevents the product from detecting data that becomes invalid after the filtering step.
CWE identifiers in this view are associated with clusters of Software Fault Patterns (SFPs).