Home / Vulnerability Database / Python : Resource injection
Python
Python : Resource injection
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
Overview
An attacker can gain access to reading and changing protected system resources of the application has the ability to change the resource identifier.
Resource injection occurs when an atacker can specify identifier that will be used to access the system resource (for example, the port number to connect to the network resource). This allows him, in particular, to transfer valuable data to thied-party server.
References
- OWASP Top 10 2017-A1-Injection
- OWASP Top 10 2013-A1-Injection
- OWASP Top 10 2013-A4-Insecure Direct Object References
- CWE-99: Improper Control of Resource Identifiers (‘Resource Injection’)
- Dangerous Python Functions, Part 2
- Create, use, and remove temporary files securely
- CWE CATEGORY: OWASP Top Ten 2017 Category A1 - Injection
- CWE-1030
MEDIUM
DerScanner Severity Score
Do you want to fix Python : Resource injection in your application?
See also
Python
Python : Debug mode on
Python
Python : Web3: Deprecated method
Python
