- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`ID: csharp-security/xpath-injection
Language: C#
Severity: Error
Category: Security
CWE: 643
This rule is designed to detect and prevent potential XPath Injection vulnerabilities in your C# code. XPath Injection is a type of attack where an attacker can manipulate the structure of an XPath query by injecting malicious input. This can lead to unauthorized data access or manipulation in XML databases or documents.
The importance of this rule lies in its ability to safeguard sensitive data and uphold the integrity of your application. If an attacker can control the structure of an XPath query, they could potentially access or manipulate data they should not have access to. This could lead to data breaches or unauthorized changes to your data.
Avoid constructing XPath queries using string concatenation with user-controlled data. Instead, consider safer alternatives, such as parameterized XPath queries or validating user input before including it in an XPath query. For example, you could use regular expressions to ensure the user input only contains characters you expect. If user input must be included in an XPath query, it should be properly escaped or encoded to prevent the input from being interpreted as XPath syntax.
// test_noncompliant_xpath.cs
using System;
using System.Xml;
using Microsoft.AspNetCore.Mvc; // For context
public class VulnerableXPathController : Controller
{
// Noncompliant: Parameters concatenated directly
[HttpGet]
public IActionResult Authenticate(string user, string pass)
{
XmlDocument doc = new XmlDocument();
// Assume doc is loaded with some XML data here...
// doc.Load("users.xml");
// Vulnerable concatenation
String expression = "/users/user[@name='" + user + "' and @pass='" + pass + "']";
// Method call using the concatenated string
XmlNode userNode = doc.SelectSingleNode(expression); // Violation should be reported here
return Json(userNode != null);
}
// Noncompliant: Only one parameter concatenated
[HttpGet]
public IActionResult FindUser(string username)
{
XmlDocument doc = new XmlDocument();
// Assume doc is loaded...
string query = "//user[@id='" + username + "']/data"; // Vulnerable
XmlNodeList nodes = doc.SelectNodes(query); // Violation should be reported here
// Process nodes...
return Ok();
}
// Noncompliant: Concatenation inside the method call
[HttpGet]
public IActionResult FindUserDirect(string uid)
{
XmlDocument doc = new XmlDocument();
// Assume doc is loaded...
var node = doc.SelectSingleNode("/items/item[@uid='" + uid + "']"); // Violation here
return Json(node != null);
}
}
// test_compliant_xpath.cs
using System;
using System.Xml;
using Microsoft.AspNetCore.Mvc; // For context
using System.Text.RegularExpressions; // For validation example
public class SafeXPathController : Controller
{
// Compliant: Hardcoded XPath query
[HttpGet]
public IActionResult GetAdmins()
{
XmlDocument doc = new XmlDocument();
// Assume doc is loaded...
// Safe: Query is constant
String expression = "/users/user[@role='admin']";
XmlNodeList adminNodes = doc.SelectNodes(expression); // OK
// Process nodes...
return Ok();
}
}