官术网_书友最值得收藏!

SQLi and Other Code Injection Attacks – Accepting Unvalidated Data

SQLi is a rather old vulnerability. It's been two decades since the first public disclosures of the attack started appearing in 1998, detailed in publications such as Phrack, but it persists, often in critically damaging ways. SQLi vulnerabilities can allow an attacker to read sensitive data, update database information, and sometimes even issue OS commands. As OWASP succinctly states, the "flaw depends on the fact that SQL makes no real distinction between the control and data planes." This means that SQL commands can modify both the data they contain and parts of the underlying system running the software, so when the access prerequisites for a feature such as sqlmap's --os-shell flag are present, a SQLi flaw can be used to issue system commands.

Many tools and design patterns exist for preventing SQLi. But the pressure of getting new applications to market and iterating quickly on features means that SQLi-vulnerable inputs don't get audited, and the procedures to prevent the bug are never put into place.

As a vulnerability endemic to one of the most common languages for database development and as an easily detected, easily exploited, and richly rewarded bug, SQLi is a worthy subject for study.

主站蜘蛛池模板: 娱乐| 正镶白旗| 吴桥县| 潢川县| 高平市| 观塘区| 简阳市| 隆子县| 新巴尔虎右旗| 大宁县| 黔西| 洛川县| 建瓯市| 鹤岗市| 濮阳市| 郁南县| 柞水县| 闵行区| 长宁县| 洪江市| 米脂县| 绥宁县| 双鸭山市| 汉沽区| 全州县| 武邑县| 菏泽市| 桐柏县| 松桃| 商城县| 江门市| 迁西县| 望城县| 界首市| 大理市| 建平县| 蓬莱市| 清镇市| 门头沟区| 苍溪县| 大荔县|