13 lines
712 B
Plaintext
13 lines
712 B
Plaintext
Loop boundary injections occur in an application when the application retrieves
|
|
data from a user or a third-party service and inserts it into a loop or a
|
|
function acting as a loop, without sanitizing it first.
|
|
|
|
If an application contains a loop that is vulnerable to injections,
|
|
it is exposed to attacks that target its availability where that loop is used.
|
|
|
|
A user with malicious intent carefully performs actions whose goal is to cause
|
|
the loop to run for more iterations than the developer intended, resulting in
|
|
unexpected behavior or even a crash of the program.
|
|
|
|
After creating the malicious request, the attacker can attack the servers
|
|
affected by this vulnerability without relying on any prerequisites. |