SYM_RB_0071 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Incorrect Regular Expression

Property Value
Language ruby
Severity medium
CWE CWE-185: Incorrect Regular Expression
OWASP A05:2017 - Broken Access Control
Confidence Level Medium
Impact Level Medium
Likelihood Level Medium

Description

The code uses format validations with regular expressions that do not explicitly anchor the start (\A) and end (\Z) of the input. This means partial or unintended matches can slip through, allowing invalid or malicious input to be accepted.

Impact

Attackers could bypass input validation by crafting payloads that only partially match the intended pattern, potentially leading to security issues such as unauthorized access, account creation with invalid data, or injection attacks. This weakens the reliability of input checks and may expose sensitive functionality or data.