CWE-943: Improper Neutralization of Special Elements in Data Query Logic

Class Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product generates a query intended to access or manipulate data in a data store such as a database, but it does not neutralize or incorrectly neutralizes special elements that can modify the intended logic of the query.

常见后果

影响范围: Confidentiality Integrity Availability Access Control

技术影响: Bypass Protection Mechanism Read Application Data Modify Application Data Varies by Context

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2024-50672

NoSQL injection in product for building eLearning courses allows password resets using a query processed by the Mongoose find function

参考: CVE-2021-20736

NoSQL injection in team collaboration product

参考: CVE-2020-35666

NoSQL injection in a PaaS platform using a MongoDB operator

参考: CVE-2014-2503

Injection using Documentum Query Language (DQL)

参考: CVE-2014-2508

Injection using Documentum Query Language (DQL)

引入模式

阶段 说明
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.

适用平台

编程语言
Not Language-Specific (Undetermined)
关键信息

CWE ID: CWE-943

抽象级别: Class

结构: Simple

状态: Incomplete

相关弱点
相关攻击模式
CAPEC-676