Home / Vulnerability Database / PHP : Injection JSON
PHP

PHP : Injection JSON

Overview

Perhaps the introduction of malicious code in JSON.

JSON injection occurs when

  • Data enters the program from untrusted source
  • Data is transfered to a JSON stream

Usually, applications use JSON to store data and send messages. In the first case, JSON can be treated as cashed data, which means it can potentially contain sensitive information. In the second case, JSON is often used with the RESTful service (the service for transfering the presentation state) and can be used to transfer confidential information, such as credentials for authenticitication.

The semantics of documents can be changed as a result of the introduction of malicious code in JSON. In the least bad case, an attacker could simply insert extraneous elements into the code, which would be the reason for throwing exceptions. In the worst case, an attacker can manipulate elements, changes in which will be critical to security. In some cases, JSON injection can lead to cross-site scripting.

LOW

DerScanner Severity Score

Do you want to fix PHP : Injection JSON in your application?

See also

PHP

PHP : Null salt

PHP

PHP : Empty password

PHP

PHP : Empty salt