<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									A03:2021 — Injection - Cyber Security				            </title>
            <link>https://www.hacktheforum.com/cyber-security/a032021-injection/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Sat, 18 Apr 2026 18:08:53 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>A03:2021 — Injection</title>
                        <link>https://www.hacktheforum.com/cyber-security/a032021-injection/#post-19916</link>
                        <pubDate>Wed, 05 Nov 2025 07:40:04 +0000</pubDate>
                        <description><![CDATA[Injection vulnerabilities happen when untrusted input is interpreted as part of a command or query by an interpreter (SQL, NoSQL, OS shell, LDAP, XPath, etc.). Attackers craft input that cha...]]></description>
                        <content:encoded><![CDATA[<p><strong data-start="24" data-end="37">Injection</strong><span> vulnerabilities happen when untrusted input is interpreted as part of a command or query by an interpreter (SQL, NoSQL, OS shell, LDAP, XPath, etc.). Attackers craft input that changes the intended logic, allowing data disclosure, destruction, authentication bypass, remote code execution, or full system compromise.</span></p>
<h2 data-start="361" data-end="389"><span style="font-size: 12pt">Common injection types</span></h2>
<ul data-start="390" data-end="851">
<li data-start="390" data-end="458">
<p data-start="392" data-end="458"><strong data-start="392" data-end="416">SQL Injection (SQLi)</strong> — manipulate SQL queries (<code data-start="443" data-end="456">' OR '1'='1</code>).</p>
</li>
<li data-start="459" data-end="527">
<p data-start="461" data-end="527"><strong data-start="461" data-end="480">NoSQL Injection</strong> — e.g., MongoDB queries built from user input.</p>
</li>
<li data-start="528" data-end="616">
<p data-start="530" data-end="616"><strong data-start="530" data-end="566">Command Injection / OS Injection</strong> — attacker injects shell commands (<code data-start="602" data-end="614">; rm -rf /</code>).</p>
</li>
<li data-start="617" data-end="679">
<p data-start="619" data-end="679"><strong data-start="619" data-end="645">LDAP / XPath Injection</strong> — break directory or XML queries.</p>
</li>
<li data-start="680" data-end="781">
<p data-start="682" data-end="781"><strong data-start="682" data-end="732">Template/Server-Side Template Injection (SSTI)</strong> — inject template expressions that execute code.</p>
</li>
<li data-start="782" data-end="851">
<p data-start="784" data-end="851"><strong data-start="784" data-end="801">ORM Injection</strong> — misuse of ORM APIs that accept raw expressions.</p>
</li>
</ul>
<h2 data-start="1157" data-end="1169"><span style="font-size: 12pt">Impact</span></h2>
<ul data-start="1170" data-end="1349">
<li data-start="1170" data-end="1207">
<p data-start="1172" data-end="1207">Data leakage (read arbitrary data).</p>
</li>
<li data-start="1208" data-end="1240">
<p data-start="1210" data-end="1240">Data modification or deletion.</p>
</li>
<li data-start="1241" data-end="1265">
<p data-start="1243" data-end="1265">Authentication bypass.</p>
</li>
<li data-start="1266" data-end="1313">
<p data-start="1268" data-end="1313">Remote command execution and server takeover.</p>
</li>
<li data-start="1314" data-end="1349">
<p data-start="1316" data-end="1349">Lateral movement inside networks.</p>
</li>
</ul>
<h2 data-start="1356" data-end="1408"><span style="font-size: 12pt">Core mitigations (applied in order of priority)</span></h2>
<ol data-start="1410" data-end="2653">
<li data-start="1410" data-end="1512">
<p data-start="1413" data-end="1464"><strong data-start="1413" data-end="1464">Use parameterized queries / prepared statements</strong></p>
<ul data-start="1468" data-end="1512">
<li data-start="1468" data-end="1512">
<p data-start="1470" data-end="1512">Never build SQL with string concatenation.</p>
</li>
</ul>
</li>
<li data-start="1513" data-end="1627">
<p data-start="1516" data-end="1573"><strong data-start="1516" data-end="1573">Use safe APIs (ORM parameter binding, query builders)</strong></p>
<ul data-start="1577" data-end="1627">
<li data-start="1577" data-end="1627">
<p data-start="1579" data-end="1627">Use library binding features instead of raw SQL.</p>
</li>
</ul>
</li>
<li data-start="1628" data-end="1788">
<p data-start="1631" data-end="1694"><strong data-start="1631" data-end="1694">Use allowlists (whitelisting) for input that controls logic</strong></p>
<ul data-start="1698" data-end="1788">
<li data-start="1698" data-end="1788">
<p data-start="1700" data-end="1788">For sort fields, column names, command options — map user input to safe internal values.</p>
</li>
</ul>
</li>
<li data-start="1789" data-end="1873">
<p data-start="1792" data-end="1829"><strong data-start="1792" data-end="1829">Avoid interpreters where possible</strong></p>
<ul data-start="1833" data-end="1873">
<li data-start="1833" data-end="1873">
<p data-start="1835" data-end="1873">Don’t call the shell; use native APIs.</p>
</li>
</ul>
</li>
<li data-start="1874" data-end="1980">
<p data-start="1877" data-end="1928"><strong data-start="1877" data-end="1928">Escape only when parameterization is impossible</strong></p>
<ul data-start="1932" data-end="1980">
<li data-start="1932" data-end="1980">
<p data-start="1934" data-end="1980">Escaping is error-prone; treat as last resort.</p>
</li>
</ul>
</li>
<li data-start="1981" data-end="2073">
<p data-start="1984" data-end="2017"><strong data-start="1984" data-end="2017">Least privilege for DB and OS</strong></p>
<ul data-start="2021" data-end="2073">
<li data-start="2021" data-end="2073">
<p data-start="2023" data-end="2073">DB accounts should have only required permissions.</p>
</li>
</ul>
</li>
<li data-start="2074" data-end="2210">
<p data-start="2077" data-end="2107"><strong data-start="2077" data-end="2107">Disable dangerous features</strong></p>
<ul data-start="2111" data-end="2210">
<li data-start="2111" data-end="2210">
<p data-start="2113" data-end="2210">E.g., disable eval, JS execution in template engines, stored procedures that execute OS commands.</p>
</li>
</ul>
</li>
<li data-start="2211" data-end="2327">
<p data-start="2214" data-end="2274"><strong data-start="2214" data-end="2274">Output encoding for user data used in different contexts</strong></p>
<ul data-start="2278" data-end="2327">
<li data-start="2278" data-end="2327">
<p data-start="2280" data-end="2327">HTML encode for HTML, URL-encode for URLs, etc.</p>
</li>
</ul>
</li>
<li data-start="2328" data-end="2430">
<p data-start="2331" data-end="2372"><strong data-start="2331" data-end="2372">Input validation for expected formats</strong></p>
<ul data-start="2376" data-end="2430">
<li data-start="2376" data-end="2430">
<p data-start="2378" data-end="2430">Use strict checks (regex, types); prefer allowlists.</p>
</li>
</ul>
</li>
<li data-start="2431" data-end="2535">
<p data-start="2435" data-end="2459"><strong data-start="2435" data-end="2459">Logging &amp; monitoring</strong></p>
<ul data-start="2464" data-end="2535">
<li data-start="2464" data-end="2535">
<p data-start="2466" data-end="2535">Detect anomalies, repeated failed queries, suspicious input patterns.</p>
</li>
</ul>
</li>
<li data-start="2536" data-end="2653">
<p data-start="2540" data-end="2581"><strong data-start="2540" data-end="2581">Automated testing &amp; security scanners</strong></p>
<ul data-start="2586" data-end="2653">
<li data-start="2586" data-end="2653">
<p data-start="2588" data-end="2653">Run sqlmap, Burp Suite, OWASP ZAP; include injection tests in CI.</p>
</li>
</ul>
</li>
</ol>
<p> </p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cyber-security/">Cyber Security</category>                        <dc:creator>Rinki Singh</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cyber-security/a032021-injection/#post-19916</guid>
                    </item>
							        </channel>
        </rss>
		