Scope: Confidentiality, Integrity, Availability
Impact: Execute Unauthorized Code or Commands
Notes: Adversaries could execute system commands, typically by changing the SQL statement to redirect output to a file that can then be executed.
Scope: Confidentiality
Impact: Read Application Data
Notes: Since SQL databases generally hold sensitive data, loss of confidentiality is a frequent problem with SQL injection vulnerabilities.
Scope: Authentication
Impact: Gain Privileges or Assume Identity, Bypass Protection Mechanism
Notes: If poor SQL commands are used to check user names and passwords or perform other kinds of authentication, it may be possible to connect to the product as another user with no previous knowledge of the password.
Scope: Access Control
Impact: Bypass Protection Mechanism
Notes: If authorization information is held in a SQL database, it may be possible to change this information through the successful exploitation of a SQL injection vulnerability.
Scope: Integrity
Impact: Modify Application Data
Notes: Just as it may be possible to read sensitive information, it is also possible to modify or even delete this information with a SQL injection attack.