Home / Vulnerability Database / PL or SQL : Resource injection
PL/SQL
PL or SQL : Resource injection
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
Overview
Using data from an untrusted source to identify the resource allows an attacker to view or modify protected system resources.
The injection when working with resources (resource injection) occurs when an attacker can specify the identifier to access the system resources. This allows him/her in particular to transfer valuable data to a third party server.
References
- OWASP Top 10 2013-A1-Injection
- OWASP Top 10 2013-A4-Insecure Direct Object References
- CWE-99: Improper Control of Resource Identifiers (‘Resource Injection’)
- WPG_DOCLOAD - docs.oracle.com
- Database Real Application Security Administrator’s and Developer’s Guide - docs.oracle.com
- OWASP Top 10 2017-A1-Injection
- CWE CATEGORY: OWASP Top Ten 2017 Category A1 - Injection
- CWE-1030
MEDIUM
DerScanner Severity Score
Do you want to fix PL or SQL : Resource injection in your application?
See also
PL/SQL
PL or SQL : Open redirect
PL/SQL
PL or SQL : Cross-site scripting (XSS)
PL/SQL
