CWE-943 数据查询逻辑中特殊元素的不当中和

  • A+
所属分类:CWE(弱点枚举)

CWE-943 数据查询逻辑中特殊元素的不当中和

Improper Neutralization of Special Elements in Data Query Logic

结构: Simple

Abstraction: Class

状态: Incomplete

被利用可能性: unkown

基本描述

The application generates a query intended to access or manipulate data in a data store such as a database, but it does not neutralize or incorrectly neutralizes special elements that can modify the intended logic of the query.

扩展描述

Depending on the capabilities of the query language, an attacker could inject additional logic into the query to:

The ability to execute additional commands or change which entities are returned has obvious risks. But when the application logic depends on the order or number of entities, this can also lead to vulnerabilities. For example, if the application query expects to return only one entity that specifies an administrative user, but an attacker can change which entities are returned, this could cause the logic to return information for a regular user and incorrectly assume that the user has administrative privileges.

While this weakness is most commonly associated with SQL injection, there are many other query languages that are also subject to injection attacks, including HTSQL, LDAP, DQL, XQuery, Xpath, and "NoSQL" languages.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 74 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 74 cwe_View_ID: 699 cwe_Ordinal: Primary

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
['Confidentiality', 'Integrity', 'Availability', 'Access Control'] ['Bypass Protection Mechanism', 'Read Application Data', 'Modify Application Data', 'Varies by Context']

分析过的案例

标识 说明 链接
CVE-2014-2503 Injection using Documentum Query Language (DQL) https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2503
CVE-2014-2508 Injection using Documentum Query Language (DQL) https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2508

Notes

Relationship
It could be argued that data query languages are effectively a command language - albeit with a limited set of commands - and thus any query-language injection issue could be treated as a child of CWE-74. However, CWE-943 is intended to better organize query-oriented issues to separate them from fully-functioning programming languages, and also to provide a more precise identifier for the many query languages that do not have their own CWE identifier.
Maintenance
This entry will be made more comprehensive in future CWE versions.

文章来源于互联网:scap中文网

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: