Depending on the capabilities of the query language, an attacker could inject additional logic into the query to:
The ability to execute additional commands or change which entities are returned has obvious risks. But when the product logic depends on the order or number of entities, this can also lead to vulnerabilities. For example, if the query expects to return only one entity that specifies an administrative user, but an attacker can change which entities are returned, this could cause the logic to return information for a regular user and incorrectly assume that the user has administrative privileges.
While this weakness is most commonly associated with SQL injection, there are many other query languages that are also subject to injection attacks, including HTSQL, LDAP, DQL, XQuery, Xpath, and "NoSQL" languages.
Portée | Impact | Probabilité |
---|---|---|
Confidentiality Integrity Availability Access Control | Bypass Protection Mechanism, Read Application Data, Modify Application Data, Varies by Context |
Références | Description |
---|---|
CVE-2024-50672 | NoSQL injection in product for building eLearning courses allows password resets using a query processed by the Mongoose find function |
CVE-2021-20736 | NoSQL injection in team collaboration product |
CVE-2020-35666 | NoSQL injection in a PaaS platform using a MongoDB operator |
CVE-2014-2503 | Injection using Documentum Query Language (DQL) |
CVE-2014-2508 | Injection using Documentum Query Language (DQL) |
CAPEC-ID | Nom du modèle d'attaque |
---|---|
CAPEC-676 | NoSQL Injection An adversary targets software that constructs NoSQL statements based on user input or with parameters vulnerable to operator replacement in order to achieve a variety of technical impacts such as escalating privileges, bypassing authentication, and/or executing code. |
Nom | Organisation | Date | Date de publication | Version |
---|---|---|---|---|
CWE Content Team | MITRE | 2.7 |
Nom | Organisation | Date | Commentaire |
---|---|---|---|
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Modes_of_Introduction, Observed_Examples, Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Maintenance_Notes | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Detection_Factors, Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
CWE Content Team | MITRE | updated Alternate_Terms, Observed_Examples, References |