CAPEC 66 SQL Injection

Draft Standard High Risk
Severity High

Description

This attack exploits target software that constructs SQL statements based on user input. An attacker crafts input strings so that when the target software constructs SQL statements based on the input, the resulting SQL statement performs actions other than those the application intended. SQL Injection results from failure of the application to appropriately validate input.

Attack Execution Flow

4

Mitigations

3

Consequences

Indicators

1

Relationships

Resources Required

1