CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

ID CWE-89
Abstraction Base
Structure Simple
Status Stable
Number of CVEs 12459
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.

Modes of Introduction

Phase Note
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.
Implementation This weakness typically appears in data-rich applications that save user inputs in a database.

Applicable Platforms

Type Class Name Prevalence
Language Not Language-Specific
Technology Database Server

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-1000 Research Concepts Draft CWE-943 Improper Neutralization of Special Elements in Data Query Logic Class Simple Incomplete
CWE-1003 Weaknesses for Simplified Mapping of Published Vulnerabilities Incomplete CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Class Simple Incomplete

Common Attack Pattern Enumeration and Classification (CAPEC)

The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.

CAPEC at Mitre.org
# ID Name Weaknesses
CAPEC-7 Blind SQL Injection CWE-89
CAPEC-66 SQL Injection CWE-89
CAPEC-108 Command Line Execution through SQL Injection CWE-89
CAPEC-109 Object Relational Mapping Injection CWE-89
CAPEC-110 SQL Injection through SOAP Parameter Tampering CWE-89
CAPEC-470 Expanding Control over the Operating System from the Database CWE-89

CVEs Published

CVSS Severity

CVSS Severity - By Year

CVSS Base Score

# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...
Loading...