The software does not properly neutralize special elements that
are used in XML, allowing attackers to modify the syntax, content, or commands
of the XML before it is processed by an end system.
This entry has been deprecated. It originally came from PLOVER,
which sometimes defined "other" and "miscellaneous" categories in order to
satisfy exhaustiveness requirements for taxonomies. Within the context of CWE,
the use of a more abstract entry is preferred in mapping situations. CWE-75 is a
more appropriate mapping.
The software uses CRLF (carriage return line feeds) as a
special element, e.g. to separate lines or records, but it does not neutralize
or incorrectly neutralizes CRLF sequences from inputs.
The software constructs all or part of a code segment using
externally-influenced input from an upstream component, but it does not
neutralize or incorrectly neutralizes special elements that could modify the
syntax or behavior of the intended code segment.
The software receives input from an upstream component, but it
does not neutralize or incorrectly neutralizes code syntax before using the
input in a dynamic evaluation call (e.g. "eval").
The software receives input from an upstream component, but it
does not neutralize or incorrectly neutralizes code syntax before inserting the
input into an executable resource, such as a library, configuration file, or
template.
The software generates a web page, but does not neutralize or
incorrectly neutralizes user-controllable input that could be interpreted as a
server-side include (SSI) directive.
The PHP application receives input from an upstream component,
but it does not restrict or incorrectly restricts the input before its usage in
"require," "include," or similar functions.
The software receives input from an upstream component, but it
does not restrict or incorrectly restricts the input before it is used as an
identifier for a resource that may be outside the intended sphere of
control.