Details | |
---|---|
Alert Id | 90019 |
Alert Type | Active |
Status | release |
Risk | High |
CWE | 94 |
WASC | 20 |
Tags |
OWASP_2017_A01 OWASP_2021_A03 WSTG-V42-INPV-11 |
Summary
A code injection may be possible including custom code that will be evaluated by the scripting engine
Solution
Do not trust client side input, even if there is client side validation in place. In general, type check all data on the server side and escape all data received from the client. Avoid the use of eval() functions combined with user input data.References
- http://cwe.mitre.org/data/definitions/94.html
- https://owasp.org/www-community/attacks/Direct_Dynamic_Code_Evaluation_Eval%20Injection