Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

SQL Injection Cheat Sheet for Developers: Understanding and Preventing Attacks, Cheat Sheet of Database Programming

SQL injection attacks, types, examples and detection

Typology: Cheat Sheet

2020/2021

Uploaded on 04/27/2021

salujaa
salujaa 🇺🇸

4.3

(11)

242 documents

1 / 1

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
SQL Injection Cheat Sheet
FOR DEVELOPERS
SQL INJECTION FAQ
What SQL servers are affected by SQL injections?
All SQL servers may be affected by SQL injections: MySQL, MSSQL, Oracle, PostgreSQL, and more.
What programming languages are affected by SQL injections?
SQL injections may happen in any programming language.
What may be the consequences of an SQL injection?
An SQL injection may lead to data leaks but it may also lead to complete system compromise.
How common are SQL injections?
In 2020, SQL injections were found by Acunetix on average in 7% of web apps.
Do web application firewalls (WAF) protect against SQL injections?
No, WAFs only make it more difficult for the attacker to send SQL injection payloads.
SQL INJECTION TYPES
TYPE 1: IN-BAND SQL INJECTION: ERROR-BASED SQL INJECTION
The attacker sends a request designed to
cause an error in the database server
The server returns an error message to the
attacker
The attacker uses information contained in
the error to escalate the attack
This type of SQL injection is used to access
sensitive information such as database type,
file names, and more
Payload:
Result: The web application displays the following
error in the browser:
Error: You have an error in your SQL syntax; check the
manual that corresponds to your MySQL server version
for the right syntax to use near ''' at line 1 Warning:
mysql_fetch_array() expects parameter 1 to be resource,
boolean given in /hj/var/www/listproducts.php on line 74
EXAMPLE:
TYPE 2: IN-BAND SQL INJECTION: UNION-BASED SQL INJECTION
The attacker uses a UNION clause in the payload
The SQL engine combines sensitive information
with legitimate information that the web
application should display
The web application displays sensitive
information
Payload:
Result: The web application displays the system version
and the name of the current user:
8.0.22-0ubuntu0.20.04.2
acuart@localhost
EXAMPLE:
TYPE 3: BLIND SQL INJECTION: BOOLEAN-BASED SQL INJECTION
The attacker sends many payloads containing
expressions that evaluate to either TRUE or FALSE
Alternating between the two, the attacker can draw
conclusions about the database and its contents
This type of SQL injection is often used to access
sensitive information when the web application
returns neither meaningful error messages nor the
targeted data itself
EXAMPLE:
TYPE 4: BLIND SQL INJECTION: TIME-BASED SQL INJECTION
If the web application doesn’t return errors and the returned information is the
same for boolean-based payloads, the attacker sends a payload that includes a
time delay command such as SLEEP, which delays the whole response
The attacker draws conclusions from the length of response delays and repeats
the process as many times as necessary with different arguments
This type of an SQL injection is often used to check whether any other SQL
injections are possible
This type of SQL injection may also, for example, be used to guess the content of a
database cell a character at a time by using different ASCII values in conjunction
with a time delay
EXAMPLE:
TYPE 5: OUT-OF-BAND SQL INJECTION
EXAMPLE:
This technique is available in many programming languages
Instead of forming the query by using string concatenation, the query string includes parameters
The prepared statements library replaces these parameters with values supplied by the user, so that SQL commands
and user input (parameters) are passed separately
PARAMETERIZED QUERIES (PREPARED STATEMENTS)
PHP EXAMPLE
Using PHP Data Objects (PDO):
JAVA EXAMPLE
Use only if your programming language does not support prepared statements
To avoid SQL injections, you must use prepared statements in stored procedures
Available only for database engines that support stored procedures but most modern engines support them
The query is prepared and stored in the database engine
The application calls the stored procedure and passes variables to it
STORED PROCEDURES
MYSQL EXAMPLE
Creating the procedure:
MSSQL EXAMPLE
Creating the procedure:
SQL Injection Defense
PART 2
Note: To improve detection, it is best to employ several methods at the same time.
However, if you cannot afford it, go for the most effective method first.
METHOD TOOLS KEY PROS KEY CONS RATING
Manual code review Development
environment
May improve the
general quality of code
Unlikely to find
SQL injections
Manual penetration
testing
Attack
proxies
Able to find even very
complex and rare types
Very time and
resource intensive
Automatic code
analysis (white box
scanning)
SAST
software
Can reach even code
that is not used directly
Reports a lot of
false positives and
does not prove that
a vulnerability exists
Automatic
vulnerability scanning
(black box scanning)
DAST
software
Can run in any
environment and at any
development stage
Does not point to
the issue in the
source code
Automatic
vulnerability scanning
with proof of exploit
and grey box sensors
Acunetix
Proves that the
vulnerability exists by
showing data that
should be restricted;
points to the error in
source code or bytecode
(PHP, Java, .NET,
Node.js)
SQL Injection Detection
PART 3
Your code uses unsanitized data from user input in SQL statements
A malicious user includes SQL elements in the input in a tricky way
Your code executes these SQL elements as part of legitimate SQL statements
SQL injections happen when:
What Are SQL Injection Attacks
PART 1
SIMPLE SQL INJECTION EXAMPLE
<?PHP
$userid = $_GET["userid"];
$query = "SELECT user FROM users WHERE userid = $userid;";
$result = pg_query($conn, $query);
?>
ATTACKER REQUEST:
YOUR CODE PROCESSES THE FOLLOWING SQL QUERY:
$query = "SELECT user FROM users WHERE userid = 0; DELETE FROM users WHERE 1;";
As a result, if the current user (current database user) has suitable permissions, the entire users table is cleared.
This type of SQL injection is possible only for some databases, for example,
Microsoft SQL Server and Oracle
The attacker includes a special database command in the payload – this
command causes a request to an external resource (controlled by the attacker)
The attacker monitors for attempts to contact the external resource, for example,
DNS lookups or HTTP request logs of the external resource
If there is a request coming once the payload is executed, this confirms that the
SQL injection is possible
The attacker accesses database information and can send it to the external resource
$dbh = new PDO('mysql:host=localhost;dbname=database', 'dbuser', 'dbpasswd');
$query = "SELECT column_name FROM table_name WHERE id = :id order by column_name desc";
$sth = $dbh->prepare($query);
$sth->bindParam(':id', $_GET["id"]);
$sth->execute();
$result = $sth->fetchColumn();
int id = Integer.parseInt(id);
String query = "SELECT column_name FROM table_name WHERE id = ? order by column_name desc";
PreparedStatement stmt = connection.prepareStatement(query);
stmt.setInt(1,id);
ResultSet results = stmt.executeQuery();
CREATE PROCEDURE example(IN suppliedId VARCHAR(8))
BEGIN
SELECT column_name FROM table_name WHERE id = suppliedId;
END
Calling the procedure with id = 1:
CALL example("1");
SQL injection payload will not work:
CALL example("0;DELETE FROM users WHERE 1");
CREATE PROCEDURE dbo.example @id nvarchar(8)
AS
SELECT column_name FROM table_name WHERE id = @id;
GO
Calling the procedure with id = 1:
EXEC database.dbo.example 1;
SQL injection payload will not work:
EXEC database.dbo.example 0;DELETE FROM USERS WHERE 1
YOUR CODE IN PHP:
https://www.acunetix.com/blog/articles/exploiting-sql-injection-example/
https://www.acunetix.com/white-papers/using-dast-to-get-the-most-out-of-wafs/
http://testphp.vulnweb.com/listproducts.php?cat=1%27
http://testphp.vulnweb.com/artists.php?artist=1%20AND%201=1
http://testphp.vulnweb.com/artists.php?artist=1%20AND%201=0
http://testphp.vulnweb.com/artists.php?%20artist=1-SLEEP(3)
http://testphp.vulnweb.com/artists.php?artist=-1%20UNION%20SELECT%201,version(),current_user()
https://www.acunetix.com/blog/web-security-zone/sql-injection-compromises-entire-country/
https://www.acunetix.com/acunetix-web-application-vulnerability-report/

Partial preview of the text

Download SQL Injection Cheat Sheet for Developers: Understanding and Preventing Attacks and more Cheat Sheet Database Programming in PDF only on Docsity!

SQL Injection Cheat Sheet

FOR DEVELOPERS

S Q L I N J E C T I O N F A Q

What SQL servers are affected by SQL injections? All SQL servers may be affected by SQL injections: MySQL, MSSQL, Oracle, PostgreSQL, and more. What programming languages are affected by SQL injections? SQL injections may happen in any programming language. What may be the consequences of an SQL injection? An SQL injection may lead to data leaks but it may also lead to complete system compromise. How common are SQL injections? In 2020, SQL injections were found by Acunetix on average in 7% of web apps. Do web application firewalls (WAF) protect against SQL injections? No, WAFs only make it more difficult for the attacker to send SQL injection payloads.

S Q L I N J E C T I O N T Y P E S

T Y P E 1 : I N  B A N D S Q L I N J E C T I O N : E R R O R  B A S E D S Q L I N J E C T I O N

The attacker sends a request designed to cause an error in the database server The server returns an error message to the attacker The attacker uses information contained in the error to escalate the attack This type of SQL injection is used to access sensitive information such as database type, file names, and more

Payload:

Result: The web application displays the following error in the browser: Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''' at line 1 Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /hj/var/www/listproducts.php on line 74

E X A M P L E :

T Y P E 2 : I N  B A N D S Q L I N J E C T I O N : U N I O N  B A S E D S Q L I N J E C T I O N

The attacker uses a UNION clause in the payload The SQL engine combines sensitive information with legitimate information that the web application should display The web application displays sensitive information

Payload:

Result: The web application displays the system version and the name of the current user: 8.0.22-0ubuntu0.20.04. acuart@localhost

E X A M P L E :

T Y P E 3 : B L I N D S Q L I N J E C T I O N : B O O L E A N  B A S E D S Q L I N J E C T I O N

The attacker sends many payloads containing expressions that evaluate to either TRUE or FALSE Alternating between the two, the attacker can draw conclusions about the database and its contents This type of SQL injection is often used to access sensitive information when the web application returns neither meaningful error messages nor the targeted data itself

E X A M P L E :

T Y P E 4 : B L I N D S Q L I N J E C T I O N : T I M E  B A S E D S Q L I N J E C T I O N

If the web application doesn’t return errors and the returned information is the same for boolean-based payloads, the attacker sends a payload that includes a time delay command such as SLEEP , which delays the whole response The attacker draws conclusions from the length of response delays and repeats the process as many times as necessary with different arguments This type of an SQL injection is often used to check whether any other SQL injections are possible This type of SQL injection may also, for example, be used to guess the content of a database cell a character at a time by using different ASCII values in conjunction with a time delay

E X A M P L E :

T Y P E 5 : O U T  O F  B A N D S Q L I N J E C T I O N

E X A M P L E :

This technique is available in many programming languages Instead of forming the query by using string concatenation, the query string includes parameters The prepared statements library replaces these parameters with values supplied by the user, so that SQL commands and user input (parameters) are passed separately

P A R A M E T E R I Z E D Q U E R I E S  P R E P A R E D S T A T E M E N T S 

P H P E X A M P L E Using PHP Data Objects (PDO):

J A V A E X A M P L E

Use only if your programming language does not support prepared statements To avoid SQL injections, you must use prepared statements in stored procedures Available only for database engines that support stored procedures but most modern engines support them The query is prepared and stored in the database engine The application calls the stored procedure and passes variables to it

S T O R E D P R O C E D U R E S

M Y S Q L E X A M P L E Creating the procedure:

M S S Q L E X A M P L E Creating the procedure:

P A R T 2 SQL Injection Defense

Note: To improve detection, it is best to employ several methods at the same time. However, if you cannot afford it, go for the most effective method first.

M E T H O D T O O L S K E Y P R O S K E Y C O N S R A T I N G

Manual code review

Development environment

May improve the general quality of code

Unlikely to find SQL injections

Manual penetration testing

Attack proxies

Able to find even very complex and rare types

Very time and resource intensive

Automatic code analysis (white box scanning)

SAST

software

Can reach even code that is not used directly

Reports a lot of false positives and does not prove that a vulnerability exists

Automatic vulnerability scanning (black box scanning)

DAST

software

Can run in any environment and at any development stage

Does not point to the issue in the source code

Automatic vulnerability scanning with proof of exploit and grey box sensors

Acunetix

Proves that the vulnerability exists by showing data that should be restricted; points to the error in source code or bytecode (PHP, Java, .NET, Node.js)

P A R T 3 SQL Injection Detection

Your code uses unsanitized data from user input in SQL statements A malicious user includes SQL elements in the input in a tricky way Your code executes these SQL elements as part of legitimate SQL statements

SQL injections happen when:

P A R T 1 What Are SQL Injection Attacks

S I M P L E S Q L I N J E C T I O N E X A M P L E

<?PHP

$userid = $_GET["userid"]; $query = "SELECT user FROM users WHERE userid = $userid;"; $result = pg_query($conn, $query); ?>

A T T A C K E R R E Q U E S T :

Y O U R C O D E P R O C E S S E S T H E F O L L O W I N G S Q L Q U E R Y :

$query = "SELECT user FROM users WHERE userid = 0; DELETE FROM users WHERE 1;";

As a result, if the current user (current database user) has suitable permissions, the entire users table is cleared.

This type of SQL injection is possible only for some databases, for example, Microsoft SQL Server and Oracle The attacker includes a special database command in the payload – this command causes a request to an external resource (controlled by the attacker) The attacker monitors for attempts to contact the external resource, for example, DNS lookups or HTTP request logs of the external resource If there is a request coming once the payload is executed, this confirms that the SQL injection is possible The attacker accesses database information and can send it to the external resource

$dbh = new PDO('mysql:host=localhost;dbname=database', 'dbuser', 'dbpasswd'); $query = "SELECT column_name FROM table_name WHERE id = :id order by column_name desc"; $sth = $dbh->prepare($query); $sth->bindParam(':id', $_GET["id"]); $sth->execute(); $result = $sth->fetchColumn();

int id = Integer.parseInt(id); String query = "SELECT column_name FROM table_name WHERE id =? order by column_name desc"; PreparedStatement stmt = connection.prepareStatement(query); stmt.setInt(1,id); ResultSet results = stmt.executeQuery();

CREATE PROCEDURE example(IN suppliedId VARCHAR(8)) BEGIN SELECT column_name FROM table_name WHERE id = suppliedId; END

Calling the procedure with id = 1:

CALL example("1");

SQL injection payload will not work:

CALL example("0;DELETE FROM users WHERE 1");

CREATE PROCEDURE dbo.example @id nvarchar(8) AS SELECT column_name FROM table_name WHERE id = @id; GO

Calling the procedure with id = 1: EXEC database.dbo.example 1;

SQL injection payload will not work:

EXEC database.dbo.example 0;DELETE FROM USERS WHERE 1

Y O U R C O D E I N P H P :

https://w w w. acunetix.com/b l og/articles/expl oiting-s q l - injection-exampl e/

https://w w w. acunetix.com/w hite-papers/ u s ing-d ast-to-get-the-most-out-of-w afs/

http://testphp.v u l nweb.com/l istproducts.p hp?cat=1%

http://testphp.v u l nweb.com/artists.p hp?artist=1%20AND%201=

http://testphp.v u l nweb.com/artists.p hp?artist=1%20AND%201=

http://testphp.v u l nweb.com/artists.p hp?% 20artist=1-SLEEP(3)

http://testphp.v u l nweb.com/artists.p hp?artist=-1%20UNION%20SELECT%201,version(), curr ent_us er()

https://w w w. acunetix.com/b l og/w eb-s ecurity-z one/sq l - injection-compr omises-entire-country/

https://w w w. acunetix.com/acunetix-w eb-appl ication-vu l nerability-r eport/