Jump to content
xisto Community
contactskn

What Is The Meaning Of Sql Vulnerability?

Recommended Posts

Recently dear friends I encountered this term that is SQL vulnerability. But unfortunately I don?t know the meaning of this term. Any one there to help me with the detailed meaning of this term. Moreover I would like to know that is it dangerous for any site to be SQL vulnerable. If so how could we rectify this negative factor of any website? One more thing which I want to know is how I could find whether my site is comes under this category or not.

Share this post


Link to post
Share on other sites

SQL vulnerability usually deals with the script that was written that makes use of an SQL-based database. If one is careless with their script and doesn't have anything to counter things like SQL injections, then their entire database can be disclosed to the hacker. When the database is disclosed, things like user names, e-mail addresses, passwords and even credit card numbers can be obtained. You should be able to see from that just how big of a problem having a SQL vulnerability in your script can be.There are programs out there that test out your site's vulnerabilities (though they may come with a hefty price tag) and report to you the results. Aside from any bugs within the database server itself, it is usually in the hands of the developer to make sure that their script is not vulnerable to things like SQL injections. A general rule of thumb is to filter all input. Find out what is considered a special character for the SQL syntax and prevent users from using them to their advantage.

Share this post


Link to post
Share on other sites

An SQL vulnerability means you have a security issue with the SQL database used in your site, some of your SQL code or your database connection code. Most often it refers to an issue known as a SQL injection. This is where you don't validate user input correctly, and they can insert arbitrary code into your SQL statements. From there they can then extract all sorts of information from your database or wipe the whole thing so you lose everything. Take the following fairly common and insecure PHP code:

 

$query = "SELECT * FROM user_data WHERE username = '" . $username . "';";

A malicious user could then put certain text into the username form on the website to create a malicious query. For example, if they typed demo'; DROP TABLE user_data;-- as their username, the SQL query would become:

 

SELECT * FROM user_data WHERE username = 'demo'; DROP TABLE user_data;-- ';

 

And you can kiss goodbye to your user data.

 

Finding out if your site is basically vulnerable is fairly easy - check if you validate all user input, strip it of control characters, make all user input safe. There are often more subtle vulnerabilities too, and these can take months to reveal.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.