Home / Vulnerability Database / Scala : Resource injection
Scala
Scala : Resource injection
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
Overview
Using data from an untrusted source to identify the resource allows an attacker to view or modify protected system resources.
The injection when working with resources (resource injection) occurs when an attacker can specify the identifier to access the system resources (for example, the port number for the network resource access). This allows him/her in particular to transfer valuable data to a third party server.
Injection vulnerabilities take the first place in the “OWASP Top 10 2017” web-application vulnerabilities ranking.
MEDIUM
DerScanner Severity Score
Do you want to fix Scala : Resource injection in your application?
See also
Scala
Scala : Unreleased resource stream
Scala
Scala : Multiple loggers in same class
Scala
