Code injection is the malicious injection or introduction of code into an application. The code introduced or injected is capable of compromising database integrity and/or compromising privacy properties, security and even data correctness. It can also steal data and/or bypass access and authentication control. Code injection attacks can plague applications that depend on user input for execution.
Code Injection differs from Command Injection. Here an attacker is only limited by the functionality of the injected language itself. For example, if an attacker is able to inject PHP code into an application and have it executed, he is only limited by what PHP is capable of.
Code injection vulnerabilities range from easy to difficult-to-find ones. Many solutions have been developed for thwarting these types of code injection attacks, for both application and architecture domain. Some examples include input validation, parameterization, privilege setting for different actions, addition of extra layer of protection and others.
When a developer uses the PHP eval() function and passes it untrusted data that an attacker can modify, code injection could be possible.
The example below shows a dangerous way to use the eval() function:
As there is no input validation, the code above is vulnerable to a Code Injection attack.
Above will show all the info of php.
While exploiting bugs like these, an attacker may want to execute system commands. In this case, a code injection bug can also be used for command injection, for example:
This will tell the ids of the process.
uid=33(www-data) gid=33(www-data) groups=33(www-data)
Ideally, a developer should use existing API for their language. For example (Java): Rather than use Runtime.exec() to issue a ‘mail’ command, use the available Java API located at javax.mail.*
If no such available API exists, the developer should scrub all input for malicious characters. Implementing a positive security model would be most efficient. Typically, it is much easier to define the legal characters than the illegal characters.
This article is contributed by Akash Sharan. If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.
- Basic SQL Injection and Mitigation with Example
- Command Injection Vulnerability and Mitigation
- Mitigation of SQL Injection Attack using Prepared Statements (Parameterized Queries)
- How to use SQLMAP to test a website for SQL Injection vulnerability
- What is Google Code-In?
- Hackathon - Think, Code, Create
- Why is it Better to Learn to Code on a Whiteboard?
- Making a QR code for a website
- Top 10 Python IDE and Code Editors in 2020
- Packaging and Publishing Python code
- How to run Python code on Google Colaboratory
- How to Participate in Google Code-In (GCI) as a Mentor?
- Google Summer of Code Preparation
- Cracking Google Summer of Code 101
- GeeksforGeeks Coderita - Empowering Women To Code
- Top 5 Open Source Code Editors in 2020
- 7 Tips To Write Clean And Better Code in 2020
- Performing Google Search using Python code
- 5 Tips On Learning How to Code - General Advice For Programmers
- 7 Common Mistakes That Beginners Should Avoid While Learning to Code