This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10 2013-A1-Injection"
From OWASP
Line 23: | Line 23: | ||
<table style="border: none; text-align: left; width: 100%; border-spacing:5px 5px;"> | <table style="border: none; text-align: left; width: 100%; border-spacing:5px 5px;"> | ||
<tr> | <tr> | ||
− | + | <td style="vertical-align: top; width: 50%"> | |
− | <td style="vertical-align: top; width: 50% | + | <div style=" padding: 5px; border: 3px solid #93b88b; background-color: #d9ead5"> |
<div style="font-style: bold; color: #000000; font-size: 150%;">Am I vulnerable to</div> | <div style="font-style: bold; color: #000000; font-size: 150%;">Am I vulnerable to</div> | ||
+ | </div> | ||
hardy har har har | hardy har har har | ||
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1|year=2013}} | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1|year=2013}} | ||
Line 32: | Line 33: | ||
#blankBullet1 | #blankBullet1 | ||
#blankBullet2 | #blankBullet2 | ||
− | + | </td></tr> | |
− | + | <td style="vertical-align: top; width: 50%; padding: 5px; border: 3px solid #93b88b; background-color: #d9ead5"> | |
− | {{Top_10_2010:ExampleBeginTemplate}}<span style="color:red;">blank code</span>{{Top_10_2010:ExampleEndTemplate}} | + | |
+ | <div style="font-style: bold; color: #000000; font-size: 150%;">Am I vulnerable to</div> | ||
+ | hardy har har har{{Top_10_2010:ExampleBeginTemplate}}<span style="color:red;">blank code</span>{{Top_10_2010:ExampleEndTemplate}} | ||
blank | blank | ||
{{Top_10_2010:ExampleBeginTemplate}}<nowiki>http://example.com/app/accountView?id=</nowiki><span style="color: red;">' or '1'='1</span>{{Top_10_2010:ExampleEndTemplate}} | {{Top_10_2010:ExampleBeginTemplate}}<nowiki>http://example.com/app/accountView?id=</nowiki><span style="color: red;">' or '1'='1</span>{{Top_10_2010:ExampleEndTemplate}} |
Revision as of 02:56, 16 February 2013
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
[[Top 10 {{{year}}}-Main|← Main]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-Broken Authentication and Session Management|Broken Authentication and Session Management →]] |
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific | Exploitability EASY |
Prevalence COMMON |
Detectability AVERAGE |
Impact SEVERE |
Application / Business Specific |
blank. | blank | blank | blank | blank |
Am I vulnerable to
hardy har har har |
How Do I Prevent 'Injection'?
blank
|
Am I vulnerable to
hardy har har harblank code
blank http://example.com/app/accountView?id=' or '1'='1
blank |
References
OWASP External | </tr>
[[Top 10 {{{year}}}-Main|← Main]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-Broken Authentication and Session Management|Broken Authentication and Session Management →]] |