Tag: injection
Rule to detect reflected XSS.
Deserialization of untrusted objects can lead to security vulnerabilities such as, inadvertently running remote code.
Use of unsanitized user input to build connection strings can allow attackers to bypass security checks and access restricted resources.
Potentially unsanitized user input in XPath queries can allow an attacker to control the query in unwanted or insecure ways.
Passing data from an untrusted source into a cookie or web response might expose the user to HTTP response splitting attacks.
Insufficient sanitization of potentially untrusted URLs on the server side can allow server requests to unwanted destinations.
Creating file paths from untrusted input might give a malicious actor access to sensitive files.
Security decisions should not depend on branching that can be influenced by untrusted or client-provided data.
Objects that parse or handle XML can lead to XML External Entity (XXE) attacks when misconfigured.
LDAP queries that rely on potentially untrusted inputs can allow attackers to read or modify sensitive data, run code, and perform other unwanted actions.
Public method parameters should be validated for nullness, unexpected values, and malicious values.
Using untrusted inputs in a log statement can enable attackers to break the log's format, forge log entries, and bypass log monitors.
Objects that parse or handle XML in XML document can lead to XML External Entity (XXE) attacks when misconfigured.
Scripts generated from unsanitized inputs can lead to malicious behavior and inadvertently running code remotely.
Insufficiently restrictive file uploads can lead to inadvertently running malicious code.
Insecure configuration can lead to a cross-site request forgery (CRSF) vulnerability.
Use of unsanitized external input in reflection can allow attackers to bypass security checks and run malicious code.
Relying on potentially untrusted user inputs when constructing web application outputs can lead to cross-site scripting vulnerabilities.
Constructing operating system or shell commands with unsanitized user input can lead to inadvertently running malicious code.
Use of untrusted inputs in SQL database query can enable attackers to read, modify, or delete sensitive data in the database
Deserialization of untrusted data without sufficiently verifying that the resulting data will be valid.