This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10 2013-A1-Injection"
From OWASP
Line 21: | Line 21: | ||
{{Top_10_2010:SummaryTableEndTemplate}} | {{Top_10_2010:SummaryTableEndTemplate}} | ||
− | + | <table style="border: none; text-align: left; width: 100%; border-spacing:5px 5px;"> | |
− | + | <tr> | |
+ | |||
+ | <td style="vertical-align: top; width: 50%; padding: 5px; border: 3px solid #93b88b; background-color: #d9ead5"> | ||
+ | |||
+ | <div style="font-style: bold; color: #000000; font-size: 150%;">Am I vulnerable to</div> | ||
+ | hardy har har har | ||
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1|year=2013}} | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1|year=2013}} | ||
blank | blank |
Revision as of 01:22, 16 February 2013
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
[[Top 10 {{{year}}}-Main|← Main]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-Broken Authentication and Session Management|Broken Authentication and Session Management →]] |
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific | Exploitability EASY |
Prevalence COMMON |
Detectability AVERAGE |
Impact SEVERE |
Application / Business Specific |
blank. | blank | blank | blank | blank |
Am I vulnerable to
hardy har har har |
How Do I Prevent 'Injection'?
blank
|
Example Attack Scenarios
blank blank code
blank http://example.com/app/accountView?id=' or '1'='1
blank |
References
OWASP External |
[[Top 10 {{{year}}}-Main|← Main]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-Broken Authentication and Session Management|Broken Authentication and Session Management →]] |