Injection into interpreted languages is a very broad topic, encompassing many
different kinds of vulnerability and potentially affecting every component of a
web application’s supporting infrastructure. The detailed steps for detecting
and exploiting code injection flaws are dependent upon the language that is
being targeted and the programming techniques employed by the application’s
developers. In every instance, however, the generic approach is as follows:
■
Supply unexpected syntax that may cause problems within the context of
the particular interpreted language.
■
Identify any anomalies in the application’s response that may indicate
the presence of a code injection vulnerability.
■
If any error messages are received, examine these to obtain evidence
Do'stlaringiz bilan baham: |