Home / Vulnerability Database / Java : Unsafe database connection (getConnection)
Java
Java : Unsafe database connection (getConnection)
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
CWE
Overview
The application connects to the database using getConnection with a parameter obtained from an untrusted source.
Unsafe database connection attacks (Security Misconfiguration) take the sixth place in the OWASP Top 10 2017 web application vulnerabilities ranking.
By sending specific arguments to the ConnectionType.getConnection function via XMLRPC an attacker can trigger a remote code execution condition. An attacker can leverage this vulnerability to execute code under the context of the current process.
MEDIUM
DerScanner Severity Score
Do you want to fix Java : Unsafe database connection (getConnection) in your application?
See also
Java
Java : Race condition
Java
Java : Text4Shell Vulnerability
Java
