Details | |
---|---|
Alert Id | 90021 |
Alert Type | Active |
Status | release |
Risk | High |
CWE | 643 |
WASC | 39 |
Technologies Targeted | All |
Tags |
OWASP_2017_A01 OWASP_2021_A03 WSTG-V42-INPV-09 |
Summary
XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. It can be used directly by an application to query an XML document, as part of a larger operation such as applying an XSLT transformation to an XML document, or applying an XQuery to an XML document. The syntax of XPath bears some resemblance to an SQL query, and indeed, it is possible to form SQL-like queries on an XML document using XPath.
If an application uses run-time XPath query construction, embedding unsafe user input into the query, it may be possible for the attacker to inject data into the query such that the newly formed query will be parsed in a way differing from the programmer’s intention.