Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Suppose a system authenticates users by issuing the following query to a SQL database. If the query returns any results, authentication succeeds; otherwise, authentication fails.

Code Block
languagesql
SELECT * FROM db_user WHERE username='<USERNAME>' AND 
                            password='<PASSWORD>'

Suppose an attacker can substitute arbitrary strings for <USERNAME> and <PASSWORD>. In that case, the authentication mechanism can be bypassed by supplying the following <USERNAME> with an arbitrary password:

Code Block
languagesql
validuser' OR '1'='1

The authentication routine dynamically constructs the following query:

Code Block
languagesql
SELECT * FROM db_user WHERE username='validuser' OR '1'='1' AND password='<PASSWORD>'

...

Similarly, an attacker could supply the following string for <PASSWORD> with an arbitrary username:

Code Block
languagesql
' OR '1'='1

producing the following query:

Code Block
languagesql
SELECT * FROM db_user WHERE username='<USERNAME>' AND password='' OR '1'='1'

...

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

IDS00-J

High

ProbableLikely

Medium

P12P18

L1

Automated Detection

FBSECURITY.SQL_PREPARED_STATEMENT_GENERATED_FROM_NONCONSTANT_STRING
FB.SECURITY.SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTEA prepared statement is generated from a nonconstant String
Nonconstant string passed to execute method on an SQL statement
ToolVersionCheckerDescription
The Checker Framework

Include Page
The Checker Framework_V
The Checker Framework_V

Tainting CheckerTrust and security errors (see Chapter 8)
CodeSonar
Include Page
CodeSonar_V
CodeSonar_V

JAVA.

IO.INJ.SQL

SQL Injection (Java)

Coverity7.5

SQLI
FB.SQL_PREPARED_STATEMENT_GENERATED_

FB.SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE

Implemented
Findbugs1.0SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTEImplemented
Fortify1.0

HTTP_Response_Splitting
SQL_Injection__Persistence
SQL_Injection

Implemented
Klocwork

Include Page
Klocwork

_V
Klocwork_V

SV.DATA.BOUND

SV.DATA.DB
SV.HTTP_SPLITSQL
SV.PATH
SV.PATH.INJ
SV.SQLSQL.DBSOURCE

Implemented
Parasoft Jtest
Include Page
Parasoft_V
Parasoft_V
BD-SECURITY-CERT.IDS00.TDSQLImplementedProtect against SQL injection
SonarQube Java Plugin
Include Page
SonarQube Java Plugin_V
SonarQube Java Plugin_V

S2077 -

S3649

Executing SQL queries is security-sensitive

S3649 - SQL queries should not be vulnerable to injection attacks

SpotBugs

Include Page
SpotBugs_V
SpotBugs_V

SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE
SQL_PREPARED_STATEMENT_GENERATED_FROM_NONCONSTANT_STRING

Implemented

Related Vulnerabilities

...