Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Property
Languagejavascript
Severitylow
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelLow
Impact LevelMedium
Likelihood LevelLow

Description

The code uses eval(), which executes code constructed as a string. If any part of this string can be influenced by user input or external sources, attackers may run malicious code within your application.

Impact

Exploiting this issue could allow attackers to execute arbitrary JavaScript in your app, leading to data theft, site defacement, or full system compromise. This can result in loss of user trust, data breaches, and potential legal consequences.

Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Property
Languagejavascript
Severitymedium
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelMedium

Description

The code is using functions like eval(), new Function(), setTimeout(), or setInterval() to execute JavaScript code that includes user input from the browser’s URL (such as query parameters or hash). This allows attackers to inject malicious scripts if they can control that input.

Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Property
Languagejavascript
Severityhigh
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelHigh
Impact LevelMedium
Likelihood LevelMedium

Description

User input from web requests (such as query parameters, request bodies, or headers) is being passed to JavaScript’s eval() function. This allows attackers to inject and execute arbitrary code within your application.

Impact

If exploited, an attacker could run malicious code on your server, potentially leading to data theft, unauthorized system access, or a complete takeover of the application. This poses a serious risk to both user data and the integrity of your system.

Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Property
Languagejavascript
Severitymedium
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelLow
Impact LevelMedium
Likelihood LevelMedium

Description

Using require() with a variable (non-literal) argument can let attackers control which files or modules your code loads at runtime. This makes it possible for untrusted input to determine what code is executed.

Impact

If exploited, an attacker could load and execute malicious code or access sensitive files on the server, potentially leading to data theft, system compromise, or further attacks against your application and its users.

Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Property
Languagejavascript
Severitymedium
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelLow
Impact LevelHigh
Likelihood LevelMedium

Description

Using eval() or Function() to execute code from strings can allow attackers to inject and run malicious JavaScript if any part of the input is user-controlled. This practice makes your application vulnerable to code injection.

Impact

If exploited, an attacker could execute arbitrary code on your server or within your application, leading to data theft, service disruption, or further compromise of your system. This could result in loss of sensitive information, unauthorized actions, or complete takeover of the application.

Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Property
Languagephp
Severityhigh
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelHigh
Impact LevelMedium
Likelihood LevelMedium

Description

Using user-supplied input (e.g., from $_GET, $_POST, or route parameters) directly in the PHP assert() function is dangerous because it effectively executes arbitrary PHP code from the user. This allows attackers to inject and run malicious code on your server.

Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Property
Languagephp
Severitymedium
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelLow
Impact LevelHigh
Likelihood LevelLow

Description

Using assert() with variables that may contain user input is dangerous because assert() will evaluate the input as PHP code. This can allow attackers to execute arbitrary code on your server if they can control the input passed to assert().

Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Property
Languagepython
Severityhigh
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelMedium
Impact LevelHigh
Likelihood LevelHigh

Description

User input from web requests is being passed directly to run_in_subinterp, which executes Python code in a new interpreter. This allows attackers to inject and run arbitrary Python code on the server.

Impact

If exploited, an attacker could execute any Python commands on the server, potentially leading to data theft, data loss, service disruption, or full system compromise. This puts both the application and underlying server at severe risk.

Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Property
Languagepython
Severityhigh
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelMedium
Impact LevelHigh
Likelihood LevelMedium

Description

User input is being passed directly into _xxsubinterpreters.run_string(), which executes the input as Python code. This allows attackers to inject and run arbitrary code on the server.

Impact

If exploited, an attacker could execute any Python commands with the application’s privileges, leading to data theft, system compromise, or complete server takeover. This could result in loss of sensitive data, service disruption, or further attacks on your infrastructure.

Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Property
Languagepython
Severityhigh
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelMedium
Impact LevelHigh
Likelihood LevelMedium

Description

User-provided input is being passed directly to Python’s InteractiveConsole or InteractiveInterpreter methods, which execute code dynamically. This means attackers could supply malicious code that gets executed by your application.

Impact

If exploited, an attacker could run arbitrary Python commands on your server, potentially gaining full control over the system, accessing sensitive data, altering application behavior, or causing service disruptions.