The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval").

Impact: Read Files or DirectoriesRead Application Data
The injected code could access restricted data / files.
Impact: Bypass Protection Mechanism
In some cases, injectable code controls authentication; this may lead to a remote vulnerability.
Impact: Gain Privileges or Assume Identity
Injected code can access resources that the attacker is directly prevented from accessing.
Impact: Execute Unauthorized Code or Commands
Code injection attacks can lead to loss of data integrity in nearly all cases as the control-plane data injected is always incidental to data recall or writing. Additionally, code injection can often result in the execution of arbitrary code or at least modify what code can be executed.
Impact: Hide Activities
Often the actions performed by injected control code are unlogged.
Strategy: Input Validation
Effectiveness: Discouraged Common Practice
perl
perl
perl
perl
perlbashbashpythonbashpythonMedium