SQL Injection

SQL injection is the insertion or injection of a SQL query via input data from the client to the application. Successful attacks can lead to an attacker accessing sensitive data from the database, modifying database data, potentially shutting the database down or issuing other admin commands, recovering the contents of files, and occasionally issuing commands to the operating system. This type of attack is relatively easy to detect and exploit, so it particularly important that any vulnerable systems are quickly remediated.

It occurs when data enters a program from an untrusted source and the data is used to dynamically construct a SQL query. Because SQL doesn't distinguish between the control plane and the data plane, the attacker can place a meta character (a character not interpreted as data, such as _ which, in SQL, will read as a wildcard for a single character) into data input, then follow by entering SQL commands in the control plane.

For example, in the following comic, if the string "Robert'); DROP TABLE Students;–-" were entered into a query which requested the studentName, then the query becomes the following:

AND studentName = 'Robert';

DROP TABLE Students;

--'

The drop table command is used to delete a table and all the rows in that table, while the pair of hyphens tells most database servers that the remainder of the statement should be treated as a comment (allowing the server to ignore the trailing ' left by the modified query).

Many database servers allow for multiple queries to be executed at once, as long as they're separated by semicolons. If they do, this type of attack allows the attacker to execute several commands against a database (several database servers, including Oracle, do not allow this type of execution).

https://xkcd.com/327/

Preventing SQL injection is actually fairly simple - either don't allow dynamic queries or prevent user supplied input which contains malicious SQL from affecting the logic of the query.

Other Types of SQL Injection

  • Error-Based: The attacker relies on detailed error messages from the database to learn about the database structure. In order to prevent this, only generic error messages should be shown.
  • Blind: Occurs when the app is vulnerable to SQL injection, but only shows generic error messages (rather than detailed error messages or the results of the query). One way to access information is to use true/false queries and extract information one question at a time. Another option is to send a command which asks the database to wait a specific amount of time before returning a response. Depending on how long the database takes to respond with an error message, the attacker can infer whether or not the command returned true or false.
  • UNION: Leverages the UNION operator to retrieve data from multiple tables in the database.
  • Out of Band: Relatively uncommon, but occurs when an attacker can't receive a response to their command in the same channel they submitted it. Instead, it relies upon a server's ability to use another protocol (like HTTP or DNS) to deliver the responses to an attacker's query.

Mitigation Measures

Prepared statements (with parameterized queries): Parameterized queries require developers to define all SQL code and pass each parameter to the query later. Then, the database can distinguish between code and data, regardless of user input. For example, if an attacker entered the name "Robert'); DROP TABLE Students;–-" the parameterized query would no longer be vulnerable and would instead look for a name which literally matched the entire string "Robert'); DROP TABLE Students;–-". The benefit of prepared statements is that SQL code stays within the application, making it (mostly) database independent.

This can harm performance, in rare cases. If it does, the developer will need to strongly validate all data or escape all user supplied input using an escaping routine specific to the database.

Stored procedures: Stored procedures are pre-created SQL statements with parameters which do not include any dynamic SQL generation (it can be done, but should not be). In order to set up stored procedures, developers need to build SQL statements with parameters for any needed inputs.

The difference between stored procedures and prepared statements is that stored procedures are defined and stored within the database, but called from the application. Also, as stored procedures require execute rights in some DBMS (which are not available by default), it's important to create a separate account with least privileges rather than giving owner access.

Allowlist Input Validation:  Allowlist input validation checks external input against a set of known, approved input, failing any inputs which don't match. This should only be used in cases where bind variables are not allowed (the placeholders for actual values in SQL statements).

Allowlist input validation can also be a back up option to detect input before it is passed to the query.

Escaping All User Supplied Input: This should only be used if the previous options aren't possible, as it cannot prevent all SQL injection - essentially it's only appropriate for legacy code which cannot be re-written to use one of the earlier recommendations. Unfortunately, this is a very database-specific implementation.

Each DBMS supports a character-escaping scheme and if all user input is escaped using the correctly scheme, the DBMS will be able to differentiate between the input and the SQL code written by developers.

Least Privilege: Least privilege isn't a defense against SQL injection, but is a way to limit the damage any attack can do. Ensuring that application accounts only have as many permissions as they need and no more can be frustrating (it's definitely easier to give them DBA or admin rights, but provides significantly more attack surface). Rather than taking away access from accounts, start from the ground up, only granting exactly what access is needed. For example, if an account needs read only access, make sure it has read only access to just the tables it needs (or even portions of a table). If you can, avoid granting create or delete access to database accounts. Each user/application should have a separate account.

Additionally, review the privileges of the operating system account under which the database management system (DBMS) runs. By default, many run under very powerful accounts - change that to a more appropriate privilege.

Sources/Further Reading:

Show Comments
As seen in: