logo

Database

Description

The system constructs system commands using inputs that can be manipulated externally, it does not correctly neutralize special elements that could modify the system command.

Impact

Execute unauthorized scripts.

Recommendation

Use whitelists or identifiers that are then transformed into static inputs to Call() calls.

Threat

Anonymous attacker from the Internet.

Expected Remediation Time

⏱️ 30 minutes.