CWE-652: Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')

ID CWE-652
Abstraction Base
Structure Simple
Status Incomplete
The product uses external input to dynamically construct an XQuery expression used to retrieve data from an XML database, but it does not neutralize or incorrectly neutralizes that input. This allows an attacker to control the structure of the query.

The net effect is that the attacker will have control over the information selected from the XML database and may use that ability to control application flow, modify logic, retrieve unauthorized data, or bypass important checks (e.g. authentication).

Modes of Introduction

Phase Note
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.

Applicable Platforms

Type Class Name Prevalence
Language Not Language-Specific

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-1000 Research Concepts Draft CWE-943 Improper Neutralization of Special Elements in Data Query Logic Class Simple Incomplete
CWE-1000 Research Concepts Draft CWE-91 XML Injection (aka Blind XPath Injection) Base Simple Draft
Loading...
Loading...