0
      1
      2
      3
      4
      5
      6


What is a SQL Injection?

SQL injection is a technique to attack database based applications. The attacker inserts SQL statements into an input field of the application for execution by the database. An application with a vulnerability can be used by an attacker to dump the contents of a database, delete the database contents, insert HTML code to perform Cross-site scripting (XSS) attack, and much more.

Example SQL injection in PHP/MySQL
$_GET['student_id']='0; DELETE FROM students WHERE 1';

This is a very simple example, but this example would delete the entire contents of the students database.

How can I prevent this sql injection attack in my PHP/MySQL application?

Use prepared statements and parameterized queries

With prepared statements and parameterized queries the SQL queries are sent to the database separately from the data. The SQL statements are parsed and compiled by the database server and you use placeholders like "?" or ":name" to specify the parameters (Depends on what functions/libraries you use, see examples below). Then when the query is executed the parameters are combined with the compiled SQL query. Since the parameters are combined with the compiled query instead of a SQL string there is no way to trick the query to execute arbitrary code and this prevents the sql injection.

Examples

  • Use MySQLi:
    More on MySQLi prepared statements

  • Use PDO Extension:
    More about the PDO extension

Escaping the special characters in your data

Date posted: June 21, 2014 | Author: | No Comments »

Categories: Programming Web

Tags: , ,

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © 2013, Neil Bittner. All Rights Reserved.