Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-183:Permissive List of Allowed Inputs
Weakness ID:183
Version:v4.17
Weakness Name:Permissive List of Allowed Inputs
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Draft
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are explicitly allowed by policy because the inputs are assumed to be safe, but the list is too permissive - that is, it allows an input that is unsafe, leading to resultant weaknesses.

▼Extended Description

▼Alternate Terms
Allowlist / Allow List

This is used by CWE and CAPEC instead of other commonly-used terms. Its counterpart is denylist.


Safelist / Safe List

This is often used by security tools such as firewalls, email or web gateways, proxies, etc.


Whitelist / White List

This term is frequently used, but usage has been declining as organizations have started to adopt other terms.

▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
CanPrecedeAllowedB434Unrestricted Upload of File with Dangerous Type
ChildOfDiscouragedP697Incorrect Comparison
ParentOfAllowedB186Overly Restrictive Regular Expression
ParentOfAllowedB625Permissive Regular Expression
ParentOfAllowedV627Dynamic Variable Evaluation
ParentOfAllowedV942Permissive Cross-domain Policy with Untrusted Domains
Nature: CanPrecede
Mapping: Allowed
Type: Base
ID: 434
Name: Unrestricted Upload of File with Dangerous Type
Nature: ChildOf
Mapping: Discouraged
Type: Pillar
ID: 697
Name: Incorrect Comparison
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 186
Name: Overly Restrictive Regular Expression
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 625
Name: Permissive Regular Expression
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 627
Name: Dynamic Variable Evaluation
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 942
Name: Permissive Cross-domain Policy with Untrusted Domains
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC722OWASP Top Ten 2004 Category A1 - Unvalidated Input
MemberOfProhibitedC990SFP Secondary Cluster: Tainted Input to Command
MemberOfProhibitedC1215Data Validation Issues
MemberOfProhibitedC1348OWASP Top Ten 2021 Category A04:2021 - Insecure Design
MemberOfProhibitedC1397Comprehensive Categorization: Comparison
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 722
Name: OWASP Top Ten 2004 Category A1 - Unvalidated Input
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 990
Name: SFP Secondary Cluster: Tainted Input to Command
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1215
Name: Data Validation Issues
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1348
Name: OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1397
Name: Comprehensive Categorization: Comparison
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-294Not Language-Specific Weaknesses
MemberOfProhibitedBSBOSS-316Bypass Protection Mechanism (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-294
Name: Not Language-Specific Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-316
Name: Bypass Protection Mechanism (impact)
▼Relevant To View
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC1215Data Validation Issues
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1215
Name: Data Validation Issues
Relevant to the view"OWASP Top Ten (2021) - (1344)"
NatureMappingTypeIDName
MemberOfProhibitedC1348OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1348
Name: OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC990SFP Secondary Cluster: Tainted Input to Command
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 990
Name: SFP Secondary Cluster: Tainted Input to Command
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
Access ControlN/ABypass Protection Mechanism
N/A
Scope: Access Control
Likelihood: N/A
Impact: Bypass Protection Mechanism
Note:
N/A
▼Potential Mitigations
▼Modes Of Introduction
Phase: Implementation
Note:

N/A

▼Applicable Platforms
Languages
Class: Not Language-Specific(Undetermined Prevalence)
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
CVE-2019-12799
chain: bypass of untrusted deserialization issue (CWE-502) by using an assumed-trusted class (CWE-183)
CVE-2019-10458
sandbox bypass using a method that is on an allowlist
CVE-2017-1000095
sandbox bypass using unsafe methods that are on an allowlist
CVE-2019-10458
CI/CD pipeline feature has unsafe elements in allowlist, allowing bypass of script restrictions
CVE-2017-1000095
Default allowlist includes unsafe methods, allowing bypass of sandbox
Reference: CVE-2019-12799
Description:
chain: bypass of untrusted deserialization issue (CWE-502) by using an assumed-trusted class (CWE-183)
Reference: CVE-2019-10458
Description:
sandbox bypass using a method that is on an allowlist
Reference: CVE-2017-1000095
Description:
sandbox bypass using unsafe methods that are on an allowlist
Reference: CVE-2019-10458
Description:
CI/CD pipeline feature has unsafe elements in allowlist, allowing bypass of script restrictions
Reference: CVE-2017-1000095
Description:
Default allowlist includes unsafe methods, allowing bypass of sandbox
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      Primary
      N/A
      Ordinality: Primary
      Description:
      N/A
      ▼Detection Methods
      Automated Static Analysis
      Detection Method ID:DM-14
      Description:

      Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

      Effectiveness:High
      Note:

      N/A

      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      PLOVERN/AN/APermissive Whitelist
      Taxonomy Name: PLOVER
      Entry ID: N/A
      Fit: N/A
      Entry Name: Permissive Whitelist
      ▼Related Attack Patterns
      IDName
      CAPEC-120
      Double Encoding
      CAPEC-3
      Using Leading 'Ghost' Character Sequences to Bypass Input Filters
      CAPEC-43
      Exploiting Multiple Input Interpretation Layers
      CAPEC-71
      Using Unicode Encoding to Bypass Validation Logic
      ID: CAPEC-120
      Name: Double Encoding
      ID: CAPEC-3
      Name: Using Leading 'Ghost' Character Sequences to Bypass Input Filters
      ID: CAPEC-43
      Name: Exploiting Multiple Input Interpretation Layers
      ID: CAPEC-71
      Name: Using Unicode Encoding to Bypass Validation Logic
      ▼References
      Reference ID: REF-62
      Title: The Art of Software Security Assessment
      Author: Mark Dowd, John McDonald, Justin Schuh
      Section: Chapter 8, "Eliminating Metacharacters", Page 435
      Publication:
      Publisher:Addison Wesley
      Edition:1st Edition
      URL:
      URL Date:
      Day:N/A
      Month:N/A
      Year:2006
      Details not found