CodeWallDocs
Reference

Attack Types

Vulnerability classes that CodeWall tests for during penetration testing.

CodeWall tests for a wide range of vulnerability classes across the OWASP Top 10 and beyond.

Injection attacks

Attack TypeDescription
SQL InjectionInjecting SQL queries through user input to read, modify, or delete database data
Cross-site Scripting (XSS)Injecting scripts that execute in other users' browsers (reflected, stored, DOM-based)
Command InjectionExecuting arbitrary OS commands through application inputs
LDAP InjectionManipulating LDAP queries through unsanitized input
NoSQL InjectionExploiting NoSQL databases through query manipulation
Template Injection (SSTI)Injecting code into server-side template engines
Header InjectionInjecting malicious content via HTTP headers

Authentication and access control

Attack TypeDescription
Authentication BypassCircumventing login mechanisms to gain unauthorized access
Broken Object-Level Authorization (BOLA/IDOR)Accessing resources belonging to other users by manipulating identifiers
Privilege EscalationGaining higher-level permissions than intended
Session FixationForcing a user to use a known session ID
JWT VulnerabilitiesExploiting weak JWT signing, algorithm confusion, or missing validation
Default CredentialsTesting for unchanged default passwords on services and admin interfaces

Server-side attacks

Attack TypeDescription
Server-Side Request Forgery (SSRF)Making the server send requests to unintended destinations
Remote Code Execution (RCE)Executing arbitrary code on the target server
Local File Inclusion (LFI)Reading arbitrary files from the server's filesystem
Remote File Inclusion (RFI)Including and executing remote files on the server
XML External Entity (XXE)Exploiting XML parsers to read files or perform SSRF

Configuration and infrastructure

Attack TypeDescription
Security MisconfigurationIdentifying insecure defaults, open cloud storage, verbose errors
Information DisclosureExposed config files, stack traces, source code, internal IPs
SSL/TLS WeaknessesWeak ciphers, expired certificates, missing HSTS
CORS MisconfigurationOverly permissive cross-origin resource sharing policies
Open RedirectRedirecting users to attacker-controlled sites via URL parameters
Cache PoisoningManipulating caches to serve malicious content to other users

Client-side attacks

Attack TypeDescription
Cross-Site Request Forgery (CSRF)Tricking users into performing unintended actions
ClickjackingFraming pages to trick users into clicking hidden elements
DOM-based vulnerabilitiesClient-side JavaScript flaws exploitable without server interaction

Known vulnerabilities

Attack TypeDescription
Public CVEsKnown vulnerabilities in identified software versions
Outdated dependenciesLibraries and frameworks with known security issues
Exposed tokens and secretsAPI keys, credentials, or secrets leaked in source code or responses