- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 207字
- 2021-07-16 17:53:18
SQLi and Other Code Injection Attacks – Accepting Unvalidated Data
SQLi is a rather old vulnerability. It's been two decades since the first public disclosures of the attack started appearing in 1998, detailed in publications such as Phrack, but it persists, often in critically damaging ways. SQLi vulnerabilities can allow an attacker to read sensitive data, update database information, and sometimes even issue OS commands. As OWASP succinctly states, the "flaw depends on the fact that SQL makes no real distinction between the control and data planes." This means that SQL commands can modify both the data they contain and parts of the underlying system running the software, so when the access prerequisites for a feature such as sqlmap's --os-shell flag are present, a SQLi flaw can be used to issue system commands.
Many tools and design patterns exist for preventing SQLi. But the pressure of getting new applications to market and iterating quickly on features means that SQLi-vulnerable inputs don't get audited, and the procedures to prevent the bug are never put into place.
As a vulnerability endemic to one of the most common languages for database development and as an easily detected, easily exploited, and richly rewarded bug, SQLi is a worthy subject for study.
- CTF實戰:技術、解題與進階
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 可信計算3.0工程初步
- 網絡安全保障能力研究
- 計算機病毒分析與防范大全(第3版)
- 計算機網絡安全技術研究
- 云原生安全技術實踐指南
- 人工智能安全(精裝版)
- 構建新型網絡形態下的網絡空間安全體系
- Bug Bounty Hunting Essentials
- Practical Internet of Things Security
- Instant OSSEC Host-based Intrusion Detection System
- 一本書講透混合云安全
- 網站入侵與腳本技術快速防殺
- 大話數據恢復