CAPEC-7: Blind SQL Injection

ID CAPEC-7
Typical Severity High
Likelihood Of Attack High
Status Draft

Blind SQL Injection results from an insufficient mitigation for SQL Injection. Although suppressing database error messages are considered best practice, the suppression alone is not sufficient to prevent SQL Injection. Blind SQL Injection is a form of SQL Injection that overcomes the lack of error messages. Without the error messages that facilitate SQL Injection, the adversary constructs input strings that probe the target through simple Boolean SQL expressions. The adversary can determine if the syntax and structure of the injection was successful based on whether the query was executed or not. Applied iteratively, the adversary determines how and where the target is vulnerable to SQL Injection.

https://capec.mitre.org/data/definitions/7.html

Weaknesses

# ID Name Type
CWE-20 Improper Input Validation weakness
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') weakness
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') weakness
CWE-209 Generation of Error Message Containing Sensitive Information weakness
CWE-697 Incorrect Comparison weakness
CWE-707 Improper Neutralization weakness

Taxonomiy Mapping

Type # ID Name
OWASP Attacks Blind SQL Injection
Loading...