SQL Injection vulnerability occurs when a user input is used in the construction of an SQL query without proper user input string neutralization (sanitization). A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown of the DBMS), recover the content of a given file present on the DBMS file system or in some cases issue commands to the operating system
Compliance Standard Violations
PCI DSS: PCI DSS 6.5.1 - Injection Flaws
NIST: SI-10: Information Input Validation
OWASP Top 10: A1: Injection
HIPAA: 164.312 (a)(1): Standard: Access control
HITRUST: 10.b - Input Data Validation (Level 1 Implementation)
Using prepared statements (with parameterized queries)
Correct filtering (escaping) of string literal escape characters in SQL statements, like single quote ('), double quote ("), backslash (\) and the NULL byte
Checking parameters for valid representation for the give type (integer, float or boolean)
Correct database permissions on logon, which restricts web application or user access to unnecessary data
Vulnerability Description
SQL Injection vulnerability occurs when a user input is used in the construction of an SQL query without proper user input string neutralization (sanitization). A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown of the DBMS), recover the content of a given file present on the DBMS file system or in some cases issue commands to the operating system
Compliance Standard Violations
Vulnerabilities
org/owasp/webgoat/sql_injection/introduction/SqlInjectionLesson4.java
aaaDetails
org/owasp/webgoat/sql_injection/introduction/SqlInjectionLesson4.java:63
### SnippetSuppress Vulnerability
### Remediation Recommondationsorg/owasp/webgoat/sql_injection/introduction/SqlInjectionLesson8.java:58
### SnippetSuppress Vulnerability
### Remediation SuggestionCreate PR
Suppressed Vulnerabilities