CWE-117

GPTKB entity

Statements (32)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:bfsLayer 6
gptkbp:bfsParent gptkb:CWE-74
gptkbp:affects Mobile Applications
Web Applications
Desktop Applications
gptkbp:category Input Validation and Representation
gptkbp:difficulty gptkb:tank
gptkbp:example An attacker can inject malicious content into log files.
gptkbp:has_weakness gptkb:CWE-200
gptkb:CWE-22
gptkb:CWE-23
gptkb:CWE-74
gptkb:CWE-117
gptkb:CWE-134
gptkb:CWE-209
gptkb:CWE-36
gptkb:CWE-611
gptkb:CWE-77
gptkb:CWE-89
gptkb:CWE-20
CWE-78
CWE-116
https://www.w3.org/2000/01/rdf-schema#label CWE-117
gptkbp:impact Log Injection
gptkbp:is_described_as The software does not properly neutralize special elements in output that are used in log files.
gptkbp:is_protected_by Sanitize log output.
gptkbp:name Improper Output Neutralization for Logs
gptkbp:related_to gptkb:CWE-74
gptkb:CWE-77
gptkb:CWE-89
gptkb:CWE-20