CWEs that violate the OWASP 2017 standard
This table lists all the CWEs that may cause an application to not pass a policy that includes an OWASP 2017 policy rule.
CWE ID | CWE name | Static support | Dynamic support | Veracode severity |
---|---|---|---|---|
5 | J2EE Misconfiguration: Data Transmission Without Encryption | |||
9 | J2EE Misconfiguration: Weak Access Permissions for EJB Methods | |||
13 | ASP.NET Misconfiguration: Password in Configuration File | |||
16 | Configuration | X | 0 - Informational | |
22 | Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) | X | X | 3 - Medium |
23 | Relative Path Traversal | |||
24 | Path Traversal: '../filedir' | |||
25 | Path Traversal: '/../filedir' | |||
26 | Path Traversal: '/dir/../filename' | |||
27 | Path Traversal: 'dir/../../filename' | |||
28 | Path Traversal: '..\filedir' | |||
29 | Path Traversal: '\..\filename' | |||
30 | Path Traversal: '\dir\..\filename' | |||
31 | Path Traversal: 'dir\..\..\filename' | |||
32 | Path Traversal: '...' (Triple Dot) | |||
33 | Path Traversal: '....' (Multiple Dot) | |||
34 | Path Traversal: '....//' | |||
35 | Path Traversal: '.../...//' | |||
36 | Absolute Path Traversal | |||
37 | Path Traversal: '/absolute/pathname/here' | |||
38 | Path Traversal: '\absolute\pathname\here' | |||
39 | Path Traversal: 'C:dirname' | |||
40 | Path Traversal: '\\UNC\share\name\' (Windows UNC Share) | |||
74 | Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) | X | 4 - High | |
75 | Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) | |||
76 | Improper Neutralization of Equivalent Special Elements | |||
77 | Improper Neutralization of Special Elements used in a Command (Command Injection) | X | 5 - Very High | |
78 | Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) | X | X | 5 - Very High |
79 | Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) | X | X | 3 - Medium |
80 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) | X | X | 3 - Medium |
81 | Improper Neutralization of Script in an Error Message Web Page | |||
82 | Improper Neutralization of Script in Attributes of IMG Tags in a Web Page | |||
83 | Improper Neutralization of Script in Attributes in a Web Page | X | 3 - Medium | |
84 | Improper Neutralization of Encoded URI Schemes in a Web Page | |||
85 | Doubled Character XSS Manipulations | |||
86 | Improper Neutralization of Invalid Characters in Identifiers in Web Pages | X | 3 - Medium | |
87 | Improper Neutralization of Alternate XSS Syntax | |||
88 | Argument Injection or Modification | X | 3 - Medium | |
89 | Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) | X | X | 4 - High |
90 | Improper Neutralization of Special Elements used in an LDAP Query (LDAP Injection) | X | 3 - Medium | |
91 | XML Injection (aka Blind XPath Injection) | X | 3 - Medium | |
93 | Improper Neutralization of CRLF Sequences (CRLF Injection) | X | 3 - Medium | |
94 | Improper Control of Generation of Code (Code Injection) | X | 3 - Medium | |
95 | Improper Neutralization of Directives in Dynamically Evaluated Code (Eval Injection) | X | 5 - Very High | |
96 | Improper Neutralization of Directives in Statically Saved Code (Static Code Injection) | |||
97 | Improper Neutralization of Server-Side Includes (SSI) Within a Web Page | |||
98 | Improper Control of Filename for Include/Require Statement in PHP Program (PHP Remote File Inclusion) | X | X | 4 - High |
99 | Improper Control of Resource Identifiers (Resource Injection) | X | 3 - Medium | |
102 | Struts: Duplicate Validation Forms | |||
113 | Improper Neutralization of CRLF Sequences in HTTP Headers (HTTP Response Splitting) | X | X | 3 - Medium |
117 | Improper Output Neutralization for Logs | X | 3 - Medium | |
202 | Exposure of Sensitive Data Through Data Queries | |||
209 | Information Exposure Through an Error Message | X | X | 2 - Low |
210 | Information Exposure Through Self-generated Error Message | |||
211 | Information Exposure Through Externally-Generated Error Message | |||
219 | Sensitive Data Under Web Root | |||
220 | Sensitive Data Under FTP Root | |||
223 | Omission of Security-relevant Information | X | 2 - Low | |
256 | Unprotected Storage of Credentials | X | 3 - Medium | |
257 | Storing Passwords in a Recoverable Format | |||
258 | Empty Password in Configuration File | |||
259 | Use of Hard-coded Password | X | X | 3 - Medium |
260 | Password in Configuration File | |||
261 | Weak Cryptography for Passwords | X | 3 - Medium | |
262 | Not Using Password Aging | |||
263 | Password Aging with Long Expiration | |||
266 | Incorrect Privilege Assignment | |||
267 | Privilege Defined With Unsafe Actions | |||
268 | Privilege Chaining | |||
269 | Improper Privilege Management | |||
270 | Privilege Context Switching Error | |||
271 | Privilege Dropping / Lowering Errors | |||
272 | Least Privilege Violation | X | 3 - Medium | |
276 | Incorrect Default Permissions | |||
277 | Insecure Inherited Permissions | |||
278 | Insecure Preserved Inherited Permissions | |||
279 | Incorrect Execution-Assigned Permissions | |||
281 | Improper Preservation of Permissions | |||
282 | Improper Ownership Management | X | 3 - Medium | |
283 | Unverified Ownership | |||
284 | Improper Access Control | X | 3 - Medium | |
285 | Improper Authorization | X | X | 3 - Medium |
286 | Incorrect User Management | |||
287 | Improper Authentication | X | X | 4 - High |
288 | Authentication Bypass Using an Alternate Path or Channel | |||
289 | Authentication Bypass by Alternate Name | |||
290 | Authentication Bypass by Spoofing | |||
291 | Reliance on IP Address for Authentication | |||
293 | Using Referer Field for Authentication | |||
294 | Authentication Bypass by Capture-replay | |||
295 | Improper Certificate Validation | X | 3 - Medium | |
296 | Improper Following of a Certificate's Chain of Trust | X | 3 - Medium | |
297 | Improper Validation of Certificate with Host Mismatch | X | X | 3 - Medium |
298 | Improper Validation of Certificate Expiration | X | 3 - Medium | |
299 | Improper Check for Certificate Revocation | X | 3 - Medium | |
300 | Channel Accessible by Non-Endpoint (Man-in-the-Middle) | |||
301 | Reflection Attack in an Authentication Protocol | |||
302 | Authentication Bypass by Assumed-Immutable Data | |||
303 | Incorrect Implementation of Authentication Algorithm | |||
305 | Authentication Bypass by Primary Weakness | |||
306 | Missing Authentication for Critical Function | |||
307 | Improper Restriction of Excessive Authentication Attempts | |||
308 | Use of Single-factor Authentication | |||
309 | Use of Password System for Primary Authentication | |||
311 | Missing Encryption of Sensitive Data | X | 3 - Medium | |
312 | Cleartext Storage of Sensitive Information | X | 3 - Medium | |
313 | Cleartext Storage in a File or on Disk | X | 3 - Medium | |
314 | Cleartext Storage in the Registry | |||
315 | Cleartext Storage of Sensitive Information in a Cookie | |||
316 | Cleartext Storage of Sensitive Information in Memory | X | 3 - Medium | |
317 | Cleartext Storage of Sensitive Information in GUI | |||
318 | Cleartext Storage of Sensitive Information in Executable | |||
319 | Cleartext Transmission of Sensitive Information | X | 3 - Medium | |
320 | Key Management Errors | |||
321 | Use of Hard-coded Cryptographic Key | X | X | 3 - Medium |
322 | Key Exchange without Entity Authentication | |||
325 | Missing Required Cryptographic Step |