Modes Of Introduction
Implementation : REALIZATION: This weakness is caused during implementation of an architectural security tactic.
Piattaforme applicabili
Linguaggio
Class: Not Language-Specific (Undetermined)
Conseguenze comuni
| Ambito |
Impatto |
Probabilità |
Confidentiality Integrity Availability Access Control | Bypass Protection Mechanism, Read Application Data, Modify Application Data, Varies by Context | |
Esempi osservati
| Riferimenti |
Descrizione |
| NoSQL injection in product for building eLearning courses allows password resets using a query processed by the Mongoose find function |
| NoSQL injection in team collaboration product |
| NoSQL injection in a PaaS platform using a MongoDB operator |
| Injection using Documentum Query Language (DQL) |
| Injection using Documentum Query Language (DQL) |
Detection Methods
Automated Static Analysis
Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)
Effectiveness : High
Note sulla mappatura delle vulnerabilità
Giustificazione : This CWE entry is a Class and might have Base-level children that would be more appropriate
Commento : Examine children of this entry to see if there is a better fit
Pattern di attacco correlati
| CAPEC-ID |
Nome del pattern di attacco |
| CAPEC-676 |
NoSQL Injection
|
Note
It could be argued that data query languages are effectively a command language - albeit with a limited set of commands - and thus any query-language injection issue could be treated as a child of CWE-74. However, CWE-943 is intended to better organize query-oriented issues to separate them from fully-functioning programming languages, and also to provide a more precise identifier for the many query languages that do not have their own CWE identifier.
Riferimenti
REF-1454
NoSQL injection
PortSwigger.
https://portswigger.net/web-security/nosql-injection REF-1455
A Pentester's Guide to NoSQL Injection
The SecOps Group.
https://secops.group/a-pentesters-guide-to-nosql-injection/
Invio
| Nome |
Organizzazione |
Data |
Data di rilascio |
Version |
| CWE Content Team |
MITRE |
2014-06-19 +00:00 |
2014-06-23 +00:00 |
2.7 |
Modifiche
| Nome |
Organizzazione |
Data |
Commento |
| CWE Content Team |
MITRE |
2015-12-07 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Modes_of_Introduction, Observed_Examples, Relationships |
| CWE Content Team |
MITRE |
2018-03-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2019-06-20 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2021-03-15 +00:00 |
updated Maintenance_Notes |
| CWE Content Team |
MITRE |
2022-04-28 +00:00 |
updated Related_Attack_Patterns |
| CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Detection_Factors, Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
| CWE Content Team |
MITRE |
2024-02-29 +00:00 |
updated Demonstrative_Examples |
| CWE Content Team |
MITRE |
2025-04-03 +00:00 |
updated Alternate_Terms, Observed_Examples, References |
| CWE Content Team |
MITRE |
2025-12-11 +00:00 |
updated Weakness_Ordinalities |