Home / Vulnerability Database / Swift : Code injection
Swift
Swift : Code injection
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
CWE/SANS Top 25 2011
Overview
The application considers the unvalidated user input as the source code. Interpretation and execution of the data from an untrusted source at runtime allows an attacker to execute malicious code in the context of the application.
Many modern programming languages allow dynamic instruction interpretation. This allows the developer to lay in the application a behavior that depends on the user’s actions. Code injection vulnerabilities take the first place in the “OWASP Top 10 2017” web-application vulnerabilities ranking and occur when a developer mistakenly believes that the user will enter only “harmless” instructions. In reality, unvalidated user instructions may be dangerous.
References
- OWASP Top 10 2017-A1-Injection
- OWASP Top 10 2013-A1-Injection
- CWE-94: Improper Control of Generation of Code (‘Code Injection’)
- CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
- CWE CATEGORY: OWASP Top Ten 2017 Category A1 - Injection
- CWE-829: Inclusion of Functionality from Untrusted Control Sphere
MEDIUM
DerScanner Severity Score
Do you want to fix Swift : Code injection in your application?
See also
Swift
Swift : Nill password
Swift
Swift : Hardcoded salt
Swift
