How can prepared statements protect from SQL injection attacks?

前端 未结 9 2033
予麋鹿
予麋鹿 2020-11-21 05:40

How do prepared statements help us prevent SQL injection attacks?

Wikipedia says:

Prepared statements are resilient against SQL injection, because

相关标签:
9条回答
  • 2020-11-21 05:56

    Here is SQL for setting up an example:

    CREATE TABLE employee(name varchar, paymentType varchar, amount bigint);
    
    INSERT INTO employee VALUES('Aaron', 'salary', 100);
    INSERT INTO employee VALUES('Aaron', 'bonus', 50);
    INSERT INTO employee VALUES('Bob', 'salary', 50);
    INSERT INTO employee VALUES('Bob', 'bonus', 0);
    

    The Inject class is vulnerable to SQL injection. The query is dynamically pasted together with user input. The intent of the query was to show information about Bob. Either salary or bonus, based on user input. But the malicious user manipulates the input corrupting the query by tacking on the equivalent of an 'or true' to the where clause so that everything is returned, including the information about Aaron which was supposed to be hidden.

    import java.sql.*;
    
    public class Inject {
    
        public static void main(String[] args) throws SQLException {
    
            String url = "jdbc:postgresql://localhost/postgres?user=user&password=pwd";
            Connection conn = DriverManager.getConnection(url);
    
            Statement stmt = conn.createStatement();
            String sql = "SELECT paymentType, amount FROM employee WHERE name = 'bob' AND paymentType='" + args[0] + "'";
            System.out.println(sql);
            ResultSet rs = stmt.executeQuery(sql);
    
            while (rs.next()) {
                System.out.println(rs.getString("paymentType") + " " + rs.getLong("amount"));
            }
        }
    }
    

    Running this, the first case is with normal usage, and the second with the malicious injection:

    c:\temp>java Inject salary
    SELECT paymentType, amount FROM employee WHERE name = 'bob' AND paymentType='salary'
    salary 50
    
    c:\temp>java Inject "salary' OR 'a'!='b"
    SELECT paymentType, amount FROM employee WHERE name = 'bob' AND paymentType='salary' OR 'a'!='b'
    salary 100
    bonus 50
    salary 50
    bonus 0
    

    You should not build your SQL statements with string concatenation of user input. Not only is it vulnerable to injection, but it has caching implications on the server as well (the statement changes, so less likely to get a SQL statement cache hit whereas the bind example is always running the same statement).

    Here is an example of Binding to avoid this kind of injection:

    import java.sql.*;
    
    public class Bind {
    
        public static void main(String[] args) throws SQLException {
    
            String url = "jdbc:postgresql://localhost/postgres?user=postgres&password=postgres";
            Connection conn = DriverManager.getConnection(url);
    
            String sql = "SELECT paymentType, amount FROM employee WHERE name = 'bob' AND paymentType=?";
            System.out.println(sql);
    
            PreparedStatement stmt = conn.prepareStatement(sql);
            stmt.setString(1, args[0]);
    
            ResultSet rs = stmt.executeQuery();
    
            while (rs.next()) {
                System.out.println(rs.getString("paymentType") + " " + rs.getLong("amount"));
            }
        }
    }
    

    Running this with the same input as the previous example shows the malicious code does not work because there is no paymentType matching that string:

    c:\temp>java Bind salary
    SELECT paymentType, amount FROM employee WHERE name = 'bob' AND paymentType=?
    salary 50
    
    c:\temp>java Bind "salary' OR 'a'!='b"
    SELECT paymentType, amount FROM employee WHERE name = 'bob' AND paymentType=?
    
    0 讨论(0)
  • 2020-11-21 05:59

    The key phrase is need not be correctly escaped. That means that you don't to worry about people trying to throw in dashes, apostrophes, quotes, etc...

    It is all handled for you.

    0 讨论(0)
  • 2020-11-21 05:59

    Root Cause #1 - The Delimiter Problem

    Sql injection is possible because we use quotation marks to delimit strings and also to be parts of strings, making it impossible to interpret them sometimes. If we had delimiters that could not be used in string data, sql injection never would have happened. Solving the delimiter problem eliminates the sql injection problem. Structure queries do that.

    Root Cause #2 - Human Nature, People are Crafty and Some Crafty People Are Malicious And All People Make Mistakes

    The other root cause of sql injection is human nature. People, including programmers, make mistakes. When you make a mistake on a structured query, it does not make your system vulnerable to sql injection. If you are not using structured queries, mistakes can generate sql injection vulnerability.

    How Structured Queries Resolve the Root Causes of SQL Injection

    Structured Queries Solve The Delimiter Problem, by by putting sql commands in one statement and putting the data in a separate programming statement. Programming statements create the separation needed.

    Structured queries help prevent human error from creating critical security holes. With regard to humans making mistakes, sql injection cannot happen when structure queries are used. There are ways of preventing sql injection that don't involve structured queries, but normal human error in that approaches usually leads to at least some exposure to sql injection. Structured Queries are fail safe from sql injection. You can make all the mistakes in the world, almost, with structured queries, same as any other programming, but none that you can make can be turned into a ssstem taken over by sql injection. That is why people like to say this is the right way to prevent sql injection.

    So, there you have it, the causes of sql injection and the nature structured queries that makes them impossible when they are used.

    0 讨论(0)
  • 2020-11-21 06:01

    I read through the answers and still felt the need to stress the key point which illuminates the essence of Prepared Statements. Consider two ways to query one's database where user input is involved:

    Naive Approach

    One concatenates user input with some partial SQL string to generate a SQL statement. In this case the user can embed malicious SQL commands, which will then be sent to the database for execution.

    String SQLString = "SELECT * FROM CUSTOMERS WHERE NAME='"+userInput+"'"
    

    For example, malicious user input can lead to SQLString being equal to "SELECT * FROM CUSTOMERS WHERE NAME='James';DROP TABLE CUSTOMERS;'

    Due to the malicious user, SQLString contains 2 statements, where the 2nd one ("DROP TABLE CUSTOMERS") will cause harm.

    Prepared Statements

    In this case, due to the separation of the query & data, the user input is never treated as a SQL statement, and thus is never executed. It is for this reason, that any malicious SQL code injected would cause no harm. So the "DROP TABLE CUSTOMERS" would never be executed in the case above.

    In a nutshell, with prepared statements malicious code introduced via user input will not be executed!

    0 讨论(0)
  • 2020-11-21 06:05
    ResultSet rs = statement.executeQuery("select * from foo where value = " + httpRequest.getParameter("filter");
    

    Let’s assume you have that in a Servlet you right. If a malevolent person passed a bad value for 'filter' you might hack your database.

    0 讨论(0)
  • 2020-11-21 06:07

    The idea is very simple - the query and the data are sent to the database server separately.
    That's all.

    The root of the SQL injection problem is in the mixing of the code and the data.

    In fact, our SQL query is a legitimate program. And we are creating such a program dynamically, adding some data on the fly. Thus, the data may interfere with the program code and even alter it, as every SQL injection example shows it (all examples in PHP/Mysql):

    $expected_data = 1;
    $query = "SELECT * FROM users where id=$expected_data";
    

    will produce a regular query

    SELECT * FROM users where id=1
    

    while this code

    $spoiled_data = "1; DROP TABLE users;"
    $query        = "SELECT * FROM users where id=$spoiled_data";
    

    will produce a malicious sequence

    SELECT * FROM users where id=1; DROP TABLE users;
    

    It works because we are adding the data directly to the program body and it becomes a part of the program, so the data may alter the program, and depending on the data passed, we will either have a regular output or a table users deleted.

    While in case of prepared statements we don't alter our program, it remains intact
    That's the point.

    We are sending a program to the server first

    $db->prepare("SELECT * FROM users where id=?");
    

    where the data is substituted by some variable called a parameter or a placeholder.

    Note that exactly the same query is sent to the server, without any data in it! And then we're sending the data with the second request, essentially separated from the query itself:

    $db->execute($data);
    

    so it can't alter our program and do any harm.
    Quite simple - isn't it?

    The only thing I have to add that always omitted in the every manual:

    Prepared statements can protect only data literals, but cannot be used with any other query part.
    So, once we have to add, say, a dynamical identifier - a field name, for example - prepared statements can't help us. I've explained the matter recently, so I won't repeat myself.

    0 讨论(0)
提交回复
热议问题