-
Notifications
You must be signed in to change notification settings - Fork 1
Closed
Description
Description
Building a database query from user-controlled sources is vulnerable to insertion of malicious code by the user.
If a database query (such as a SQL or NoSQL query) is built from user-provided data without sufficient sanitization, a malicious user may be able to run malicious database queries.
Instances
Expected behaviour
Database Query must be sanitized before being passed.
References
- Wikipedia: SQL injection.
- MongoDB: $eq operator.
- Common Weakness Enumeration: CWE-89.

