2009 IEEE International Conference on Services Computing 2009
DOI: 10.1109/scc.2009.23
|View full text |Cite
|
Sign up to set email alerts
|

Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0
3

Year Published

2011
2011
2017
2017

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 53 publications
(38 citation statements)
references
References 5 publications
0
35
0
3
Order By: Relevance
“…These scenarios can be divided in web-based applications and systems , web services [34][35][36][37][38][39] network protocols and devices [11,14,[40][41][42][43][44][45][46][47][48][49][50][51][52], software and desktop applications [61], and process control system [62]. Figure 4 shows the different target scenarios that have a diversity in relation to the number of studies, and as mentioned before, most of the studies are related to web-based applications, network devices, and protocols contexts.…”
Section: Rq2-what Are the Target-scenarios In Pentest?mentioning
confidence: 99%
“…These scenarios can be divided in web-based applications and systems , web services [34][35][36][37][38][39] network protocols and devices [11,14,[40][41][42][43][44][45][46][47][48][49][50][51][52], software and desktop applications [61], and process control system [62]. Figure 4 shows the different target scenarios that have a diversity in relation to the number of studies, and as mentioned before, most of the studies are related to web-based applications, network devices, and protocols contexts.…”
Section: Rq2-what Are the Target-scenarios In Pentest?mentioning
confidence: 99%
“…By performing XPath injection there are possibilities for attackers to extract the whole XML database [38].…”
Section: Xpath Injectionmentioning
confidence: 99%
“…Successfully performed code implementation attacks give the opportunity for attackers, for example to extract the whole XML database. Some of the threats on the code implementation of the web service, which results in security vulnerabilities to attackers include, (i) SQL Injection, where the malicious SQL statements are inserted into XML in order to disrupt the back-end system, for example trying to receive data that it is not authorized to access, or even destroy the data [28], (ii) XPath Injection, as an XML document has no access control or privilege system associated with it, the attacker can to extract even the whole XML database [29], (iii) Cross-site Scripting, where the attacker inspects the web service applications and chooses the one web method that does not filter the input and at which the user is authenticated; the attacker inserts a malicious code in the request and this will be returned to the victim by web server. Then the malicious script will run at client with the privileges of a legitimate script originating from the legitimate web server [30].…”
Section: Threats On Web Service Implementation Logicmentioning
confidence: 99%