Home / Vulnerability Database / PHP : XPath injection
PHP

PHP : XPath injection

Overview

The application executes XPath query built on the basis of data from an untrusted source. An attacker can change the meaning of the executed expression or execute arbitrary query.

A possible attack scenario:

  1. The application receives input data from an untrusted source.
  2. This data is used to dynamically create XPath query.
  3. An attacker get an opportunity to influence the semantics of the query or execute his/her own queries.
MEDIUM

DerScanner Severity Score

Do you want to fix PHP : XPath injection in your application?

See also

PHP

PHP : Null salt

PHP

PHP : Empty password

PHP

PHP : Empty salt