King of Elevation of Privilege II
An attacker can inject a command that the system will run at a higher privilege level.
Threat |
|
Your application connects to a database, not in the context of the current user but as a shared database user with a high level of permissions. This is to permit different types of users to perform different tasks. You have defined what queries can be run by each type of user, but when a user manages to inject a query that performs an action, they should not have permission to do, it is executed as the shared user with elevated permissions. |
|
CAPEC |
CAPEC-7 – Blind SQL injection CAPEC-69 – Target programs with elevated privileges |
ASVS |
1.2.2 – Ensure you’re adhering to the principle of least privilege |