CWE-777: Regular Expression without Anchors

VariantIncompleteExploit Likelihood: Medium

The product uses a regular expression to perform neutralization, but the regular expression is not anchored and may allow malicious or malformed data to slip through.

View on MITRE
Back to CWE Lookup

Extended Description

When performing tasks such as validating against a set of allowed inputs (allowlist), data is examined and possibly modified to ensure that it is well-formed and adheres to a list of safe values. If the regular expression is not anchored, malicious or malformed data may be included before or after any string matching the regular expression. The type of malicious data that is allowed will depend on the context of the application and which anchors are omitted from the regular expression.

Technical Details

Structure
Simple

Applicable To

Languages
Platforms

Learn More