Incorrect Behavior Order: Validate Before Filter |
Weakness ID: 181 (Weakness Base) | Status: Draft |
Description Summary
The software validates data before it has been filtered or cleansed, which prevents the software from detecting data that becomes invalid after the filtering step.
Extended Description
This can be used by an attacker to bypass the validation and launch attacks that expose weaknesses that would otherwise be prevented, such as injection.
Reference | Description |
---|---|
CVE-2002-0934 | |
CVE-2003-0282 | |
CVE-2003-0417 | Possibly |
Inputs should be decoded and canonicalized to the application's current internal representation before being filtered |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 171 | Cleansing, Canonicalization, and Comparison Errors | Development Concepts (primary)699 |
ChildOf | ![]() | 179 | Incorrect Behavior Order: Early Validation | Research Concepts (primary)1000 |
ChildOf | ![]() | 722 | OWASP Top Ten 2004 Category A1 - Unvalidated Input | Weaknesses in OWASP Top Ten (2004) (primary)711 |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Validate-Before-Filter | ||
OWASP Top Ten 2004 | A1 | CWE More Specific | Unvalidated Input |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Potential Mitigations, Time of Introduction | ||||
2008-08-15 | Veracode | External | ||
Suggested OWASP Top Ten 2004 mapping | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Functional Areas, Relationships, Research Gaps, Taxonomy Mappings, Type | ||||
2008-10-14 | CWE Content Team | MITRE | Internal | |
updated Description | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-04-11 | Validate-before-filter | |||