Skip to content

Commit

Permalink
Fix OWASP#474 in 2017 Release
Browse files Browse the repository at this point in the history
  • Loading branch information
cmlh committed Jun 2, 2022
1 parent f7a950a commit 54724d5
Showing 1 changed file with 0 additions and 1 deletion.
1 change: 0 additions & 1 deletion 2017/en/0xa1-injection.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,6 @@ Preventing injection requires keeping data separate from commands and queries.
* The preferred option is to use a safe API, which avoids the use of the interpreter entirely or provides a parameterized interface, or migrate to use Object Relational Mapping Tools (ORMs). **Note**: Even when parameterized, stored procedures can still introduce SQL injection if PL/SQL or T-SQL concatenates queries and data, or executes hostile data with EXECUTE IMMEDIATE or exec().
* Use positive or "whitelist" server-side input validation. This is not a complete defense as many applications require special characters, such as text areas or APIs for mobile applications.
* For any residual dynamic queries, escape special characters using the specific escape syntax for that interpreter. **Note**: SQL structure such as table names, column names, and so on cannot be escaped, and thus user-supplied structure names are dangerous. This is a common issue in report-writing software.
* Use LIMIT and other SQL controls within queries to prevent mass disclosure of records in case of SQL injection.

## Example Attack Scenarios

Expand Down

0 comments on commit 54724d5

Please sign in to comment.