zoukankan      html  css  js  c++  java
  • [Security] Always use parameterized queries

    SQL databases are commonly used to store data; for example - your application could store user profile information in a database. Yous should never create inline SQL or other database queries in your code using raw user input and send it directly to the database; this behavior is a recipe for disaster, as we saw above.

    For example - do not create code like the following inline SQL example:

    string userName = Request.QueryString["username"]; // receive input from the user BEWARE!
    ...
    string query = "SELECT *  FROM  [dbo].[users] WHERE userName = '" + userName + "'";

    Here we concatenate text strings together to create the query, taking the input from the user and generating a dynamic SQL query to look up the user. Again, if a malicious user realized we were doing this, or just tried different input styles to see if there was a vulnerability, we could end up with a major disaster. Instead, use parameterized SQL statements or stored procedures such as this:

    -- Lookup a user
    CREATE PROCEDURE sp_findUser
    (
    @UserName varchar(50)
    )
    
    SELECT *  FROM  [dbo].[users] WHERE userName = @UserName

    With this method you can invoke the procedure from your code safely, passing it the userName string without worrying about it being treated as part of the SQL statement.

  • 相关阅读:
    《软件需求十步走》读书笔记二
    《软件需求十步走》读书笔记一
    FJUTOJ-周赛2016-12-16
    FJUTOJ-周赛2016-11-25
    网络爬虫
    树链剖分讲解
    HDU 5266 pog loves szh III
    HDU 3518 Boring counting
    HDU 5929 Basic Data Structure
    HDU 1055 Color a Tree
  • 原文地址:https://www.cnblogs.com/Answer1215/p/11925645.html
Copyright © 2011-2022 走看看