Only Filtering Special Elements at an Absolute Position

Incomplete Variant
Structure: Simple
Description

This vulnerability occurs when software checks for dangerous characters or patterns only at a fixed, hardcoded location in input data. Because it ignores these same elements if they appear anywhere else, attackers can bypass the filter by simply moving the malicious content to a different position.

Extended Description

Imagine a filter that only removes a semicolon if it's exactly the 10th character, believing this will prevent SQL injection. An attacker can easily bypass this by adding a few harmless characters at the start, moving the malicious semicolon to the 11th position. The filter sees nothing wrong at its one checked spot and lets the tainted data pass through, leading to a successful attack. This flaw stems from a misunderstanding of input validation. Effective security requires checking all input comprehensively, not just sampling a single location. Developers should use allowlists or context-aware encoding that processes the entire data stream, ensuring dangerous elements are neutralized no matter where they appear.

Common Consequences 1
Scope: Integrity

Impact: Unexpected State

Demonstrative Examples 1

ID : DX-4

The following code takes untrusted input and uses a substring function to filter a 3-character "../" element located at the 0-index position of the input string. It then appends this result to the /home/user/ directory and attempts to read the file in the final resulting path.

Code Example:

Bad
Perl
perl
Since the if function is only looking for a substring of "../" between the 0 and 2 position, it only removes that specific "../" element. So an input value such as:

Code Example:

Attack
bash
will have the first "../" filtered, resulting in:

Code Example:

Result
bash
This value is then concatenated with the /home/user/ directory:

Code Example:

Result
bash
which causes the /etc/passwd file to be retrieved once the operating system has resolved the ../ sequences in the pathname. This leads to relative path traversal (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')).
Modes of Introduction
Implementation