11 Facts About SQL injection

1.

SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed.

FactSnippet No. 1,326,874
2.

SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.

FactSnippet No. 1,326,875
3.

SQL injection was considered one of the top 10 web application vulnerabilities of 2007 and 2010 by the Open Web Application Security Project.

FactSnippet No. 1,326,876
4.

SQL injection occurs when specially crafted user input is processed by the receiving program in a way that allows the input to exit a data context and enter a command context.

FactSnippet No. 1,326,877
5.

The structure of the SQL injection command is and this will select all person rows rather than just those named 'susan' whose age is 2.

FactSnippet No. 1,326,878
6.

Blind SQL injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker.

FactSnippet No. 1,326,879
7.

Second order SQL injection occurs when submitted values contain malicious commands that are stored rather than executed immediately.

FactSnippet No. 1,326,880
8.

An SQL injection is a well known attack and easily prevented by simple measures.

FactSnippet No. 1,326,881
9.

In many cases, the SQL injection statement is fixed, and each parameter is a scalar, not a table.

FactSnippet No. 1,326,882
10.

The manual for an SQL injection DBMS explains which characters have a special meaning, which allows creating a comprehensive blacklist of characters that need translation.

FactSnippet No. 1,326,883
11.

Routinely passing escaped strings to SQL injection is error prone because it is easy to forget to escape a given string.

FactSnippet No. 1,326,884