ESAPI Swingset Interactive - SqlInjection


Tutorial

A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system.

The following query accepts a user input to select the details of a specific product. If the user enters a product name like '; DELETE FROM products; -- two statements will be executed.

"SELECT * FROM products WHERE name = '" + request.getParameter("product") + "'"

// product = '; DELETE FROM products; --
1. SELECT * FROM products WHERE name = '';
2. DELETE FROM products; --'

The single quotation mark closes the name parameter string and the semicolon terminates the end of the SELECT command which can be followed by a new command. The two hyphen at the end of the command comments out the rest of the line. So this whole statement will return all products with no name and than deletes all entries of the table. In general each other command could be injected instead of the DELETE depending on the rights the current user has on the database.

The best way to prevent SQL Injections is to use parameterized statements. Therefore JDBC offers PreparedStatements where the parameters are separated from the statement by using question marks as a placeholder for them. To set the values you just have to call the specific set method like setString() or setLong().

PreparedStatement stmt = con.prepareStatement("SELECT * FROM products WHERE name = ?");
stmt.setString(1, request.getParameter("product"));

If you do not have the possibility to use prepared statements ESAPI offers a method to encode a string for the use within a SQL statement but even OWASP considers this method as a weaker alternative which should only be used if it is not possible to use prepared statements.

Codec mySqlCodec = new MySQLCodec(MySQLCodec.Mode.ANSI);
String product = ESAPI.encoder().encodeForSQL(mySqlCodec, request.getParameter("product"));
String query = "SELECT * FROM products WHERE name = '" + product + "'";


OWASP Enterprise Security API Project