Pricefield | Lemmy
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
sag to Programmer [email protected] • 1 year ago

Life Hack

lemm.ee

message-square
128
fedilink
990

Life Hack

lemm.ee

sag to Programmer [email protected] • 1 year ago
message-square
128
fedilink
  • @[email protected]
    link
    fedilink
    11•1 year ago

    Oh sweet summer child.

    First, injection attacks are third on the owasp list, although they do roll xss into it too, which changed the name, since “shit sanitization on input” and “shit escaping before use” are the cause of both.
    https://owasp.org/Top10/A03_2021-Injection/

    Secondly, SQL injection is freakishly common and easy. I don’t know of any database libraries that prevent you from directly executing an SQL literal, they just encourage parameterized statements.

    I have personally run into plenty of systems where people build SQL via string concatenation because for whatever reason they can’t use an orm or “proper” SQL generator.

    You can find them in the wild fairly often by just tossing ' or 1=1;-- into fields in forms. If it gets mad in a way that doesn’t make sense or suddenly takes forever, you win!

    Don’t do that though, because it’s illegal.

    • @[email protected]
      link
      fedilink
      2•1 year ago

      Secondly, SQL injection is freakishly common and easy.

      Do you have any recent examples of major SQL injection holes?

      • Dr. Jenkem
        link
        fedilink
        English
        4•1 year ago

        https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=sql+injection

        And without giving away specifics, I’ve personally found SQLi vulns in the wild within the last 5ish years.

      • @[email protected]
        link
        fedilink
        10•
        edit-2
        1 year ago

        https://www.securityweek.com/millions-of-user-records-stolen-from-65-websites-via-sql-injection-attacks/

        https://www.darkreading.com/remote-workforce/critical-security-flaw-wordpress-sql-injection

        https://www.tenable.com/blog/cve-2023-48788-critical-fortinet-forticlientems-sql-injection-vulnerability

        https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a

        https://nvd.nist.gov/vuln/search/results?form_type=Advanced&results_type=overview&search_type=all&cwe_id=CWE-89&isCpeNameSearch=false

        You can fiddle with the nvd search settings to find whatever severity score you like, or filter by execution parameters.

        https://nvd.nist.gov/vuln/detail/CVE-2024-1597

        That one was a treat when I check under critical, since it’s an injection attack that can bypass parameterized query protections for the database driver, which is why “defense in depth” and “always sanitize your fucking inputs” are such key things to remember.

        I hope that provided what you’re looking for, and maybe increases your awareness of SQL injection. 😊

        • @[email protected]
          link
          fedilink
          4•1 year ago

          Great comment. Thanks!

Programmer [email protected]

[email protected]
Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

  • Keep content in english
  • No advertisements
  • Posts must be related to programming or programmer topics
  • 44 users / day
  • 394 users / week
  • 1.09K users / month
  • 3.8K users / 6 months
  • 3 subscribers
  • 1.42K Posts
  • 50.2K Comments
  • Modlog
  • mods:
  • Feyter
  • adr1an
  • @[email protected]
  • Pierre-Yves Lapersonne
  • UI: 0.18.4
  • BE: 0.18.2
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org