CAPEC-83: XPath Injection

ID CAPEC-83
Typical Severity High
Likelihood Of Attack High
Status Draft

An attacker can craft special user-controllable input consisting of XPath expressions to inject the XML database and bypass authentication or glean information that they normally would not be able to. XPath Injection enables an attacker to talk directly to the XML database, thus bypassing the application completely. XPath Injection results from the failure of an application to properly sanitize input used as part of dynamic XPath expressions used to query an XML database.

https://capec.mitre.org/data/definitions/83.html

Weaknesses

# ID Name Type
CWE-20 Improper Input Validation weakness
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') weakness
CWE-91 XML Injection (aka Blind XPath Injection) weakness
CWE-707 Improper Neutralization weakness

Taxonomiy Mapping

Type # ID Name
WASC 39 XPath Injection
OWASP Attacks Blind XPath Injection
OWASP Attacks XPATH Injection
Loading...