荨麻疹有什么忌口吗| iga肾病是什么意思| 浒苔是什么| 玉皇大帝叫什么名字| 马齿苋治什么病| 为什么女追男没好下场| 玩得什么| 我宣你 是什么意思| 决明子是什么东西| 儿童抗o高会引起什么病| 梅核气吃什么药| 腰椎间盘突出不能吃什么食物| 吃生蚝有什么好处和坏处| 喀秋莎什么意思| 过江龙是什么意思| 孩子脾胃虚弱吃什么药| 泻立停又叫什么名字| 七月生日是什么星座| 走路不稳是什么原因| 雾化对小孩有什么影响或者副作用| 鹌鹑蛋是什么动物的蛋| 胃癌吃什么药| 黄疸是什么意思| 痰湿吃什么药| 栀子有什么作用与功效| 失眠是什么原因引起的| 喝酒吃头孢有什么反应| 女人没有白带说明什么| 尿出来很黄是什么原因| 青光眼有什么症状| 长春有什么好吃的| 内分泌紊乱是什么意思| 尿常规异常是什么意思| 时间h代表什么| 八仙过海是什么意思| 布谷鸟是什么鸟| 四月十八是什么星座| 鹿角有什么功效和作用| 毛血旺是什么| 1948年中国发生了什么| 白发吃什么维生素| 卷腹是什么| 西瓜有什么营养| 放屁臭吃什么药| 蛇屎是什么样子| 酸豆角炒什么好吃| 莫迪是什么种姓| 骞是什么意思| 尿素氮偏高是什么意思| k9什么意思| 蜘蛛痣长什么样| 什么食物利尿| 左腰疼是什么原因| 什么教导| 片反过来念什么| 利妥昔单抗是治什么病| 心慌手抖是什么原因| 什么是水痘| 为什么叫川普| 仓鼠怀孕有什么特征| 什么林什么染| 脚后跟疼用什么药最好| 小鸟吃什么| 金牛座的幸运色是什么| 颈椎病吃什么药效果好| 3月5号是什么星座| 游园惊梦讲的是什么| 黄芪什么时候种植| 办护照需要什么材料| 肺炎支原体感染吃什么药| 乙肝两对半和乙肝五项有什么区别| 手指上长毛是什么原因| 玉米什么季节成熟| 韩后属于什么档次| 随访复查什么意思| 10月7日是什么星座| 鸡毛换糖是什么意思| 甲亢平时要注意什么| 羊和什么相冲| yet是什么意思| 辛是什么意思| 给你脸了是什么意思| 老抽和生抽有什么区别| 娃娃衫配什么裤子图片| 6.5号是什么星座| 苦瓜泡水喝有什么功效和作用| 萨德事件是什么意思| 什么泡水喝降甘油三酯| 后巩膜葡萄肿是什么意思| 头麻是什么病的前兆| 脑蛋白治疗什么病| 妇炎洁是什么| coa是什么意思| 吸烟有什么好处| 这个季节吃什么水果最好| 在屋顶唱着你的歌是什么歌| 嘴巴苦是什么原因| 农历七月初七是什么节日| 为什么心率过快| pda是什么| 眼睛有点模糊是什么原因| 葛根和粉葛有什么区别| 龙和什么生肖最配| 胃火旺盛吃什么药| 嗓子沙哑是什么原因| 中东是什么意思| 健康证挂什么科| 肥肠炖什么好吃| 遗精是什么原因引起的| iga是什么意思| 白细胞计数偏低是什么原因| 不孕为什么要查胰岛素| 摩羯座是什么象星座| 曼珠沙华是什么意思| 女单读什么| 鼻炎是什么原因引起的| 水痘是什么| 包皮手术后吃什么伤口愈合快| 矫正视力是什么意思| std是什么意思| 商数是什么意思| 提拉米苏是什么东西| 啖是什么意思| 梦到好多蛇是什么意思| 什么东西吃蟑螂| 紫萱名字的含义是什么| 清蒸鱼一般用什么鱼| 小猫为什么一直叫| 中秋是什么时候| 作祟是什么意思| 舌头上有黑苔是什么原因| 手麻抽筋是什么原因引起的| 欲加之罪何患无辞是什么意思| 子宫低回声结节是什么意思| 小脑是控制什么的| 胆汁反流是什么原因| 缺铁性贫血吃什么好| 马蜂泡酒有什么功效| 金字旁土念什么字| 口干口苦是什么病| 平安扣适合什么人戴| 涉黑是什么意思| 馒头逼是什么| 梦见对象出轨什么征兆| 或是什么意思| 什么叫盗汗| 血沉高是什么原因| 季夏是什么意思| 冬瓜什么时候成熟| 青梅是什么意思| 排骨炖什么好吃又有营养| 趾高气昂是什么意思| 今天穿什么衣服合适| 什么名字好听女生| 泡桐是什么| 膀胱过度活动症是什么原因引起的| 无花果不能和什么一起吃| 绵密是什么意思| 河南有什么景点| 复原乳是什么意思| 吃什么利尿最快| 绿茶用什么茶具泡好| 经常感觉饿是什么原因| 什么是值机| 感冒喉咙痛吃什么药| 肚子拉稀是什么原因| 氨酚咖那敏片是什么药| 国酒是什么酒| 地龙是什么东西| mrmrs是什么牌子| 弥可保是什么药| 什么然而生| 牙龈上火是什么原因引起的| 谷维素治什么病| 梦游为什么不能叫醒| 文胸是什么| 农历7月是什么月| 75属什么生肖| 解脲脲原体是什么意思| 人天是什么意思| 前纵隔结节是什么意思| 里字五行属什么| 皮肤黑穿什么颜色的衣服| 汗毛重的女人意味着什么| 良去掉一点读什么| 什么东西泡脚减肥| 马铃薯什么时候传入中国| 迎风流泪用什么眼药水| 四个月读什么| 榴莲跟什么不能一起吃| 妍五行属性是什么| 血脂高什么意思| 耳鸣吃什么药效果最好| 95511是什么号码| 做梦飞起来了是什么兆头| 孕妇梦见很多蛇是什么意思| 及什么意思| 68年属猴的是什么命| 甲鱼和什么一起炖最好| 多多保重是什么生肖| 2月15号是什么星座| 偷梁换柱是什么意思| 山药炒什么好吃| azul是什么颜色| 原浆是什么意思| 来月经吃什么水果| 湿阻病是什么病| 喝普洱茶有什么功效| nct是什么意思| 九月二十号是什么星座| 10月7日是什么星座| 点了斑不能吃什么| 肝火上炎吃什么中成药| 下巴长痘痘什么原因| 血小板低吃什么补得快| 肺部钙化灶是什么意思| 黄柏胶囊主要治什么病| 向日葵是什么季节| 夜晚尿频尿多是什么原因| 集中的近义词是什么| pcl是什么材料| 什么的智慧| 眼底出血吃什么药| 情商是什么| cd4是什么意思| 速干裤是什么面料| 什么是菩提| 4月25号什么星座| 宅男是什么意思| 脚上脱皮是什么原因| 妊娠囊是什么意思| 女生做彩超是检查什么| 麦粒肿不能吃什么食物| 10月26日什么星座| 头晃动是什么病的前兆| 小缺血灶是什么意思| 公斤的单位是什么| 618是什么日子| 壁虎为什么是五毒之一| 上火了吃什么药好| 超敏crp是什么意思| 吃什么食物能提高免疫力| 贫血都有什么症状| 第一次同房要注意什么| 岁月无痕是什么意思| 烧心是什么原因造成的| 3a是什么| 款款是什么意思| 孕妇吃西红柿对胎儿有什么好处| 洗面奶什么时候用最好| 福寿螺为什么不能吃| 蹂躏是什么意思| 首台套是什么意思| 另起炉灶是什么意思| 螺丝吃什么| 7月15日是什么节| 面瘫是什么引起的| 什么奶粉对肠胃吸收好| 天运子什么修为| 头晕恶心想吐挂什么科| 第一次坐飞机需要注意什么| 中医学学什么| 肺结节看什么科| 子宫饱满是什么意思| 百度
CWE

原告肖芬芳诉邓伟全民间借贷纠纷一案

百度   受虚假信息侵害可解除合同  根据两份合同列出的违约责任,如果买方或卖方所委托的中介方因隐瞒、虚构信息侵害买方或卖方利益的,中介方面应当退还已收取的房地产经纪服务费并依法承担赔偿责任,买方和卖方也有权单方解除合同。

A community-developed list of SW & HW weaknesses that can become vulnerabilities

New to CWE? click here!
CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
Home > CWE List > CWE-564: SQL Injection: Hibernate (4.17)  
ID

CWE-564: SQL Injection: Hibernate

Weakness ID: 564
Vulnerability Mapping: ALLOWED This CWE ID may be used to map to real-world vulnerabilities
Abstraction: Variant Variant - a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource.
View customized information:
For users who are interested in more notional aspects of a weakness. Example: educators, technical writers, and project/program managers. For users who are concerned with the practical application and details about the nature of a weakness and how to prevent it from happening. Example: tool developers, security researchers, pen-testers, incident response analysts. For users who are mapping an issue to CWE/CAPEC IDs, i.e., finding the most appropriate CWE for a specific issue (e.g., a CVE record). Example: tool developers, security researchers. For users who wish to see all available information for the CWE/CAPEC entry. For users who want to customize what details are displayed.
×

Edit Custom Filter


+ Description
Using Hibernate to execute a dynamic SQL statement built with user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands.
+ Common Consequences
Section HelpThis table specifies different individual consequences associated with the weakness. The Scope identifies the application security area that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in exploiting this weakness. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a weakness will be exploited to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.
Impact Details

Read Application Data; Modify Application Data

Scope: Confidentiality, Integrity

+ Potential Mitigations
Phase(s) Mitigation

Requirements

A non-SQL style database which is not subject to this flaw may be chosen.

Architecture and Design

Follow the principle of least privilege when creating user accounts to a SQL database. Users should only have the minimum privileges necessary to use their account. If the requirements of the system indicate that a user can read and modify their own data, then limit their privileges so they cannot read/write others' data.

Architecture and Design

For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.

Implementation

Implement SQL strings using prepared statements that bind variables. Prepared statements that do not bind variables can be vulnerable to attack.

Implementation

Use vigorous allowlist style checking on any user input that may be used in a SQL command. Rather than escape meta-characters, it is safest to disallow them entirely. Reason: Later use of data that have been entered in the database may neglect to escape meta-characters before use. Narrowly define the set of safe characters based on the expected value of the parameter in the request.
+ Relationships
Section Help This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+ Relevant to the view "Research Concepts" (View-1000)
Nature Type ID Name
ChildOf Base Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. 89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
+ Relevant to the view "CISQ Quality Measures (2020)" (View-1305)
Nature Type ID Name
ChildOf Base Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. 89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
+ Relevant to the view "Weaknesses in OWASP Top Ten (2013)" (View-928)
Nature Type ID Name
ChildOf Base Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. 89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
+ Modes Of Introduction
Section HelpThe different Modes of Introduction provide information about how and when this weakness may be introduced. The Phase identifies a point in the life cycle at which introduction may occur, while the Note provides a typical scenario related to introduction during the given phase.
Phase Note
Architecture and Design
Implementation
+ Applicable Platforms
Section HelpThis listing shows possible areas for which the given weakness could appear. These may be for specific named Languages, Operating Systems, Architectures, Paradigms, Technologies, or a class of such platforms. The platform is listed along with how frequently the given weakness appears for that instance.
Languages

SQL (Often Prevalent)

Technologies

Database Server (Undetermined Prevalence)

+ Demonstrative Examples

Example 1


The following code excerpt uses Hibernate's HQL syntax to build a dynamic query that's vulnerable to SQL injection.

(bad code)
Example Language: Java 
String street = getStreetFromUser();
Query query = session.createQuery("from Address a where a.street='" + street + "'");


+ Memberships
Section HelpThis MemberOf Relationships table shows additional CWE Categories and Views that reference this weakness as a member. This information is often useful in understanding where a weakness fits within the context of external information sources.
Nature Type ID Name
MemberOf CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. 990 SFP Secondary Cluster: Tainted Input to Command
MemberOf CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. 1027 OWASP Top Ten 2017 Category A1 - Injection
MemberOf CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. 1347 OWASP Top Ten 2021 Category A03:2021 - Injection
MemberOf CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. 1409 Comprehensive Categorization: Injection
+ Vulnerability Mapping Notes
Usage ALLOWED
(this CWE ID may be used to map to real-world vulnerabilities)
Reason Acceptable-Use

Rationale

This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

Comments

Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
+ Taxonomy Mappings
Mapped Taxonomy Name Node ID Fit Mapped Node Name
Software Fault Patterns SFP24 Tainted input to command
+ Content History
+ Submissions
Submission Date Submitter Organization
2025-08-05
(CWE Draft 3, 2025-08-05)
Anonymous Tool Vendor (under NDA)
+ Modifications
Modification Date Modifier Organization
2025-08-05
(CWE 4.17, 2025-08-05)
CWE Content Team MITRE
updated Applicable_Platforms
2025-08-05 CWE Content Team MITRE
updated Mapping_Notes
2025-08-05 CWE Content Team MITRE
updated Relationships
2025-08-05 CWE Content Team MITRE
updated Relationships
2025-08-05 CWE Content Team MITRE
updated Relationships
2025-08-05 CWE Content Team MITRE
updated Potential_Mitigations
2025-08-05 CWE Content Team MITRE
updated Relationships
2025-08-05 CWE Content Team MITRE
updated Relationships
2025-08-05 CWE Content Team MITRE
updated Taxonomy_Mappings
2025-08-05 CWE Content Team MITRE
updated Potential_Mitigations
2025-08-05 CWE Content Team MITRE
updated Relationships, Taxonomy_Mappings
2025-08-05 CWE Content Team MITRE
updated Relationships
2025-08-05 CWE Content Team MITRE
updated Potential_Mitigations
2025-08-05 CWE Content Team MITRE
updated Relationships
2025-08-05 CWE Content Team MITRE
updated Common_Consequences
2025-08-05 CWE Content Team MITRE
updated Potential_Mitigations
2025-08-05 CWE Content Team MITRE
updated Related_Attack_Patterns
2025-08-05 CWE Content Team MITRE
updated Relationships, Taxonomy_Mappings
2025-08-05 Eric Dalci Cigital
updated Time_of_Introduction
2025-08-05 Sean Eidemiller Cigital
added/updated demonstrative examples
Page Last Updated: April 03, 2025
老豆腐和嫩豆腐有什么区别 梦见自己生了个女孩是什么意思 叮咛是什么意思 手指上的月牙代表什么 cn是什么单位
什么锤百炼 丁克什么意思 小兔子吃什么食物 骨折用什么药恢复快 井柏然原名叫什么
吃生姜对身体有什么好处和坏处 紫癜是什么病 严重吗 鱼油对眼睛有什么好处 什么白云 为什么说尽量不戴脚链
30如狼40如虎是什么意思 小孩为什么经常流鼻血 医学ace是什么意思 青春永驻是什么意思 爱的本质是什么
超声波是什么意思hcv8jop4ns7r.cn 排卵期在什么时候hcv8jop1ns4r.cn 蚂蝗是什么hcv9jop7ns1r.cn 阴道炎吃什么hcv7jop7ns2r.cn 出库是什么意思hcv8jop7ns2r.cn
白头发吃什么能变黑hcv8jop0ns1r.cn 鳡鱼是什么鱼hcv8jop0ns1r.cn 泥淖是什么意思hcv7jop9ns0r.cn 有机奶粉是什么意思hcv8jop2ns9r.cn cdr是什么意思xinmaowt.com
吃了火龙果小便红色是什么原因hcv7jop6ns2r.cn 曱亢有什么症状hcv8jop5ns0r.cn 栀子花什么时候修剪hcv8jop0ns2r.cn 手淫过度会导致什么huizhijixie.com 开什么节什么的成语hcv8jop4ns1r.cn
红楼梦贾家为什么被抄家hcv8jop1ns2r.cn 双子座爱吃什么hcv7jop9ns9r.cn 人质是什么意思hcv8jop5ns4r.cn 体寒是什么原因引起的hcv9jop0ns1r.cn 内痔用什么药治最好效果最快hcv8jop0ns3r.cn
百度