14 lines
651 B
Plaintext
14 lines
651 B
Plaintext
![]() |
Database injections (such as SQL injections) occur in an application when the
|
||
|
application retrieves data from a user or a third-party service and inserts it
|
||
|
into a database query without sanitizing it first.
|
||
|
|
||
|
If an application contains a database query that is vulnerable to injections,
|
||
|
it is exposed to attacks that target any database where that query is used.
|
||
|
|
||
|
A user with malicious intent carefully performs actions whose goal is to modify
|
||
|
the existing query to change its logic to a malicious one.
|
||
|
|
||
|
After creating the malicious request, the attacker can attack the databases
|
||
|
affected by this vulnerability without relying on any pre-requisites.
|
||
|
|