Member-only story

Injection Vulnerability

Raviteja Mureboina
2 min readJun 15, 2024

In the cybersecurity realm, injection attacks stand out as one of the most dangerous vulnerabilities that applications encounter. These attacks occur when untrusted data is processed in a way that allows attackers to manipulate commands or queries. Here’s a closer look at why applications are susceptible to such attacks and how to prevent them

Injection Vulnerability

Vulnerability Points

Lack of Input Validation: Failing to validate user-supplied data before application use.

Direct Use in Queries or Commands: Employing dynamic queries without proper context-aware escaping.

Object-Relational Mapping (ORM) Issues: Allowing hostile data in ORM search parameters.

Concatenation of Strings: Merging user-supplied data with SQL or command structures.

Common Types of Injection

SQL, NoSQL, OS commands, ORM frameworks, Lightweight Directory Access Protocol , and Expression Language/Object Graph Navigation Language databases are all…

--

--

Raviteja Mureboina
Raviteja Mureboina

Written by Raviteja Mureboina

Hello Everyone, I write blogs on Cybersecurity, ML, and Cloud(AWS, Azure, GCP). please follow to stay updated https://www.youtube.com/c/RaviTejaMureboina

No responses yet