Home / Vulnerability Database / Apex : SOSL injection
Apex
Apex : SOSL injection
Classification
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
Overview
An injection in an SOSL query is possible. This can be exploited to bypass the authentication mechanism, access all database entries, or execute malicious code with application rights.
Client side code injection attacks take the first place in the “OWASP Top 10 2017” web application vulnerabilities ranking and the seventh place in the “OWASP Mobile Top 10 2014” ranking. The level of potential damage from such an attack depends on the user input validation performance and file protection mechanisms.
SOSL Injections occurs when a database query is based on data from an untrusted source (e.g., from a string entered by a user). In the absence of proper validation an attacker can modify the query to execute malicious SOSL-query.
MEDIUM
DerScanner Severity Score
Do you want to fix Apex : SOSL injection in your application?
See also
Apex
Apex : Null salt
Apex
Apex : Empty encryption key
Apex
