Injection
A type of attack where untrusted data is sent to an interpreter, which can manipulate it to execute unintended actions. Normally, it occurs when we find a way of sending HTML, CSS, JS code, database queries, and others; via a request, a form, website URL, among others.
We can find several ways of carrying out this type of attack:
Cross-Site Scripting (XSS): Injects malicious JavaScript code into a web page
SQL Injection (SQLi): Injects malicious SQL queries into a database, poisoning structured database queries based on SQL with the user input, or even NoSQL database queries
Command Injection: Executes arbitrary system commands on a server or application
Server-Side Template Injection (SSTI): Inject template syntax user that is improperly handled or validated to applications that use template engines
LDAP Injection: Manipulates LDAP queries for unauthorized directory access
XPath Injection: Alters XML Path Language (XPath) queries for unauthorized access to XML data
XXE Injection: Manipulates XML data or queries to inject malicious data
SMTP/Email Injection: Exploits vulnerabilities in email systems to inject malicious emails
Expression Language (EL) Injection: Injects malicious input into Expression Language (used in Java-based applications)
CRLF Injection: Injects carriage return and line feed characters into HTTP headers to manipulate responses
Last updated