Skip to content

Database query built from user-controlled sources #27

@celeroncoder

Description

@celeroncoder

Description

Building a database query from user-controlled sources is vulnerable to insertion of malicious code by the user.
If a database query (such as a SQL or NoSQL query) is built from user-provided data without sufficient sanitization, a malicious user may be able to run malicious database queries.

Instances

Expected behaviour

Database Query must be sanitized before being passed.

References

  1. Wikipedia: SQL injection.
  2. MongoDB: $eq operator.
  3. Common Weakness Enumeration: CWE-89.

Metadata

Metadata

Assignees

Labels

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions