SQL Injection [CWE-89] — The Hacktivists

1. Description
………………………………

The basic form of SQL injection describes the direct insertion of attacker-controlled data into variables that are used to construct SQL commands. As a result, an attacker can tamper with the original query by permanently terminating the string, appending new commands etc.

2. Potential impact
………………………………

An attacker can view, add, delete or modify information stored in the database with privileges of the current database user. In the case of a web application, this weakness often leads to a website deface or a database exfiltration.

3. Attack patterns
………………………………

An attacker exploits this weakness in software that constructs SQL commands based on user input. According to CAPEC classification, there are the following attack patterns:

4. Affected software
………………………………

Software that uses a backend database to store or read information is potentially vulnerable to this weakness. The weakness is common for many web applications since all modern content management systems are using the database to store dynamic content.

5. Exploitation Examples
………………………………

We will use as an example of the HTB23101 security advisory (CVE-2012–4034), specifically vulnerability 1.7.

6. Severity and CVSS Scoring
……………………………………..

SQL injection influences confidentiality, integrity and availability of the application. It should be scored as C:H/I:H/A:H.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
The Hacktivists

The Hacktivists

Contact us for Information Security Services & Training https://thehacktivists.in/