Categories
MySQL Tools

[The Unexpected SQL Injection] Web Security Articles – Web Application Security Consortium

[The Unexpected SQL Injection] Web Security Articles – Web Application Security Consortium

Abstract:
We will look at several scenarios under which SQL injection may occur, even though mysql_real_escape_string() has been used. There are two major steps at writing SQL injection resistant code: correct validation and escaping of input and proper use of the SQL syntax. Failure to comply with any of them may lead to compromise. Many of the specific issues are already known, but no single document mentions them all.
Although the examples are built on PHP/MySQL, the same principles apply to ASP/MSSQL and other combinations of languages and databases.