Home / Vulnerability Database / T-SQL : Undocumented feature: hidden functionality
T-SQL

T-SQL : Undocumented feature: hidden functionality

Classification

OWASP ASVS
PCI DSS 4.0

Overview

The application executes the code obtained from the string after decoding (e.g, base64). Authors of backdoors use this technique to make it difficult to detect the code that implements the undocumented functionality.

From a security perspective, even when hidden functionality is not intentionally malicious, it gives an attacker an additional opportunity for a successful application attack. For example, the hidden functionality could be useful for attacks that modify the control flow of the application.

LOW

DerScanner Severity Score

Do you want to fix T-SQL : Undocumented feature: hidden functionality in your application?

See also

T-SQL

T-SQL : Weak encryption algorithm

T-SQL

T-SQL : Weak hashing algorithm

T-SQL

T-SQL : Weak random number generator