MITRE CWE

Common Weakness Enumeration

The MITRE Corporation is a not-for-profit organization that manages federally funded research and development centers in the U.S. The Common Weakness Enumeration, short CWE, is a formal list of software weakness types targeted to developers and security practitioners. It serves as a common language to classify and categorize vulnerabilities, attacks, and faults in architecture, design, and code. Each weakness type is associated with a CWE ID which can have multiple relations to other IDs, such as being a child or a parent of another ID. Note that many CWE IDs are reserved for language specific or technology specific issues and thus not all IDs apply to the PHP programming language.

RIPS supports over 80 common security weaknesses listed in the CWE database that can be detected by static analysis software and are related to PHP, helps you quickly locate them in your application, and provides detailed information for remediation.

CWE ID Name RIPS
15 External Control of System or Configuration Setting
20 Inproper Input Validation
22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
23 Relative Path Traversal
73 External Control of File Name or Path
78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
81 Improper Neutralization of Script in an Error Message Web Page
82 Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
83 Improper Neutralization of Script in Attributes in a Web Page
84 Improper Neutralization of Encoded URI Schemes in a Web Page
86 Improper Neutralization of Invalid Characters in Identifiers in Web Pages
89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
90 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
91 XML Injection (aka Blind XPath Injection)
93 Improper Neutralization of CRLF Sequences ('CRLF Injection')
94 Improper Control of Generation of Code ('Code Injection')
95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
96 Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
97 Improper Neutralization of Server-Side Includes (SSI) Within a Web Page
98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
99 Improper Control of Resource Identifiers ('Resource Injection')
113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
114 Process Control
117 mproper Output Neutralization for Logs
120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
121 Stack-based Buffer Overflow
122 Heap-based Buffer Overflow
124 Buffer Underwrite ('Buffer Underflow')
131 Incorrect Calculation of Buffer Size
134 Use of Externally-Controlled Format String
135 Incorrect Calculation of Multi-Byte String Length
143 Improper Neutralization of Record Delimiters
185 Incorrect Regular Expression
187 Partial Comparison
190 Integer Overflow or Wraparound
200 Information Exposure
201 Information Exposure Through Sent Data
209 Information Exposure Through an Error Message
214 Information Exposure Through Process Environment
233 Improper Handling of Parameters
242 Use of Inherently Dangerous Function
248 Uncaught Exception
250 Execution with Unnecessary Privileges
253 Incorrect Check of Function Return Value
256 Plaintext Storage of a Password
259 Use of Hard-coded Password
291 Reliance on IP Address for Authentication
295 Improper Certificate Validation
297 Improper Validation of Certificate with Host Mismatch
306 Missing Authentication for Critical Function
321 Use of Hard-coded Cryptographic Key
325 Missing Required Cryptographic Step
327 Use of a Broken or Risky Cryptographic Algorithm
328 Reversible One-Way Hash
329 Not Using a Random IV with CBC Mode
330 Use of Insufficiently Random Values
331 Insufficient Entropy
346 Origin Validation Error
350 Reliance on Reverse DNS Resolution for a Security-Critical Action
352 Cross-Site Request Forgery (CSRF)
369 Divide By Zero
384 Session Fixation
390 Detection of Error Condition Without Action
396 Declaration of Catch for Generic Exception
397 Declaration of Throws for Generic Exception
400 Uncontrolled Resource Consumption ('Resource Exhaustion')
415 Double Free
416 Use After Free
434 Unrestricted Upload of File with Dangerous Type
454 External Initialization of Trusted Variables or Data Stores
456 Missing Initialization of a Variable
470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
471 Modification of Assumed-Immutable Data (MAID)
473 PHP External Variable Modification
476 NULL Pointer Dereference
477 Use of Obsolete Functions
478 Missing Default Case in Switch Statement
481 Assigning instead of Comparing
482 Comparing instead of Assigning
484 Omitted Break Statement in Switch
489 Leftover Debug Code
494 Download of Code Without Integrity Check
502 Deserialization of Untrusted Data
506 Embedded Malicious Code
523 Unprotected Transport of Credentials
539 Information Exposure Through Persistent Cookies
546 Suspicious Comment
548 Information Exposure Through Directory Listing
571 Expression is Always True
572 Expression is Always False
584 Return Inside Finally Block
597 Use of Wrong Operator in String Comparison
598 Information Exposure Through Query Strings in GET Request
601 URL Redirection to Untrusted Site ('Open Redirect')
613 Insufficient Session Expiration
614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
621 Variable Extraction Error
624 Executable Regular Expression Error
625 Permissive Regular Expression
626 Null Byte Interaction Error (Poison Null Byte)
627 Dynamic Variable Evaluation
643 Improper Neutralization of Data within XPath Expressions ('XPath Injection')
644 Improper Neutralization of HTTP Headers for Scripting Syntax
652 Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')
676 Use of Potentially Dangerous Function
693 Protection Mechanism Failure
698 Execution After Redirect (EAR)
730 Denial of Service
732 Incorrect Permission Assignment for Critical Resource
755 Improper Handling of Exceptional Conditions
759 Use of a One-Way Hash without a Salt
784 Reliance on Cookies without Validation and Integrity Checking in a Security Decision
798 Use of Hard-coded Credentials
807 Reliance on Untrusted Inputs in a Security Decision
829 Inclusion of Functionality from Untrusted Control Sphere
834 Excessive Iteration
843 Access of Resource Using Incompatible Type ('Type Confusion')
862 Missing Authorization
863 Incorrect Authorization
900 Weaknesses in the CWE/SANS Top 25 Most Dangerous Software Errors
915 Improperly Controlled Modification of Dynamically-Determined Object Attributes
916 Use of Password Hash With Insufficient Computational Effort
918 Server-Side Request Forgery (SSRF)
928 Weaknesses in OWASP Top Ten
1004 Sensitive Cookie Without 'HttpOnly' Flag
1021 Improper Restriction of Rendered UI Layers or Frames