rspec/rules/S3649/rationale.adoc

14 lines
651 B
Plaintext
Raw Permalink Normal View History

Database injections (such as SQL injections) occur in an application when the
application retrieves data from a user or a third-party service and inserts it
into a database query without sanitizing it first.
If an application contains a database query that is vulnerable to injections,
it is exposed to attacks that target any database where that query is used.
A user with malicious intent carefully performs actions whose goal is to modify
the existing query to change its logic to a malicious one.
After creating the malicious request, the attacker can attack the databases
affected by this vulnerability without relying on any pre-requisites.