Home / Vulnerability Database / JavaScript : XPath injection
JavaScript

JavaScript : XPath injection

Overview

The application executes XPath query built on the basis of data from an untrusted source. An attacker can change the meaning of the executed expression or execute arbitrary query.

A possible attack scenario:

  1. The application receives input data from an untrusted source.
  2. This data is used to dynamically create XPath query.
  3. An attacker get an opportunity to influence the semantics of the query or execute his/her own queries.
MEDIUM

DerScanner Severity Score

Do you want to fix JavaScript : XPath injection in your application?

See also

JavaScript

JavaScript : Null salt

JavaScript

JavaScript : Empty encryption key

JavaScript

JavaScript : Unsafe Azure access control