Home / Vulnerability Database / Apex : SOSL injection
Apex

Apex : SOSL injection

Classification

OWASP Top 10 2017
OWASP Top 10 2021

Overview

An injection in an SOSL query is possible. This can be exploited to bypass the authentication mechanism, access all database entries, or execute malicious code with application rights.

Client side code injection attacks take the first place in the “OWASP Top 10 2017” web application vulnerabilities ranking and the seventh place in the “OWASP Mobile Top 10 2014” ranking. The level of potential damage from such an attack depends on the user input validation performance and file protection mechanisms.

SOSL Injections occurs when a database query is based on data from an untrusted source (e.g., from a string entered by a user). In the absence of proper validation an attacker can modify the query to execute malicious SOSL-query.

MEDIUM

DerScanner Severity Score

Do you want to fix Apex : SOSL injection in your application?

See also

Apex

Apex : Null salt

Apex

Apex : Empty encryption key

Apex

Apex : Hardcoded salt