How does a PreparedStatement avoid or prevent SQL injection?

前端 未结 10 1701
再見小時候
再見小時候 2020-11-22 05:21

I know that PreparedStatements avoid/prevent SQL Injection. How does it do that? Will the final form query that is constructed using PreparedStatements will be a string or o

相关标签:
10条回答
  • 2020-11-22 05:27

    I guess it will be a string. But the input parameters will be sent to the database & appropriate cast/conversions will be applied prior to creating an actual SQL statement.

    To give you an example, it might try and see if the CAST/Conversion works.
    If it works, it could create a final statement out of it.

       SELECT * From MyTable WHERE param = CAST('10; DROP TABLE Other' AS varchar(30))
    

    Try an example with a SQL statement accepting a numeric parameter.
    Now, try passing a string variable (with numeric content that is acceptable as numeric parameter). Does it raise any error?

    Now, try passing a string variable (with content that is not acceptable as numeric parameter). See what happens?

    0 讨论(0)
  • Prepared statement is more secure. It will convert a parameter to the specified type.

    For example stmt.setString(1, user); will convert the user parameter to a String.

    Suppose that the parameter contains a SQL string containing an executable command: using a prepared statement will not allow that.

    It adds metacharacter (a.k.a. auto conversion) to that.

    This makes it is more safe.

    0 讨论(0)
  • 2020-11-22 05:30

    SQL injection: when user has the chance to input something that could be part of the sql statement

    For example:

    String query = “INSERT INTO students VALUES(‘” + user + “‘)”

    when user input “Robert’); DROP TABLE students; –” as the input, it causes SQL injection

    How prepared statement prevents this?

    String query = “INSERT INTO students VALUES(‘” + “:name” + “‘)”

    parameters.addValue(“name”, user);

    => when user input again “Robert’); DROP TABLE students; –“, the input string is precompiled on the driver as literal values and I guess it may be casted like:

    CAST(‘Robert’); DROP TABLE students; –‘ AS varchar(30))

    So at the end, the string will be literally inserted as the name to the table.

    http://blog.linguiming.com/index.php/2018/01/10/why-prepared-statement-avoids-sql-injection/

    0 讨论(0)
  • 2020-11-22 05:30

    In Prepared Statements the user is forced to enter data as parameters . If user enters some vulnerable statements like DROP TABLE or SELECT * FROM USERS then data won't be affected as these would be considered as parameters of the SQL statement

    0 讨论(0)
  • 2020-11-22 05:33

    To understand how PreparedStatement prevents SQL Injection, we need to understand phases of SQL Query execution.

    1. Compilation Phase. 2. Execution Phase.

    Whenever SQL server engine receives a query, it has to pass through below phases,

    1. Parsing and Normalization Phase: In this phase, Query is checked for syntax and semantics. It checks whether references table and columns used in query exist or not. It also has many other tasks to do, but let's not go in detail.

    2. Compilation Phase: In this phase, keywords used in query like select, from, where etc are converted into format understandable by machine. This is the phase where query is interpreted and corresponding action to be taken is decided. It also has many other tasks to do, but let's not go in detail.

    3. Query Optimization Plan: In this phase, Decision Tree is created for finding the ways in which query can be executed. It finds out the number of ways in which query can be executed and the cost associated with each way of executing Query. It chooses the best plan for executing a query.

    4. Cache: Best plan selected in Query optimization plan is stored in cache, so that whenever next time same query comes in, it doesn't have to pass through Phase 1, Phase 2 and Phase 3 again. When next time query come in, it will be checked directly in Cache and picked up from there to execute.

    5. Execution Phase: In this phase, supplied query gets executed and data is returned to user as ResultSet object.

    Behaviour of PreparedStatement API on above steps

    1. PreparedStatements are not complete SQL queries and contain placeholder(s), which at run time are replaced by actual user-provided data.

    2. Whenever any PreparedStatment containing placeholders is passed in to SQL Server engine, It passes through below phases

      1. Parsing and Normalization Phase
      2. Compilation Phase
      3. Query Optimization Plan
      4. Cache (Compiled Query with placeholders are stored in Cache.)

    UPDATE user set username=? and password=? WHERE id=?

    1. Above query will get parsed, compiled with placeholders as special treatment, optimized and get Cached. Query at this stage is already compiled and converted in machine understandable format. So we can say that Query stored in cache is Pre-Compiled and only placeholders need to be replaced with user-provided data.

    2. Now at run-time when user-provided data comes in, Pre-Compiled Query is picked up from Cache and placeholders are replaced with user-provided data.

    (Remember, after place holders are replaced with user data, final query is not compiled/interpreted again and SQL Server engine treats user data as pure data and not a SQL that needs to be parsed or compiled again; that is the beauty of PreparedStatement.)

    If the query doesn't have to go through compilation phase again, then whatever data replaced on the placeholders are treated as pure data and has no meaning to SQL Server engine and it directly executes the query.

    Note: It is the compilation phase after parsing phase, that understands/interprets the query structure and gives meaningful behavior to it. In case of PreparedStatement, query is compiled only once and cached compiled query is picked up all the time to replace user data and execute.

    Due to one time compilation feature of PreparedStatement, it is free of SQL Injection attack.

    You can get detailed explanation with example here: https://javabypatel.blogspot.com/2015/09/how-prepared-statement-in-java-prevents-sql-injection.html

    0 讨论(0)
  • 2020-11-22 05:42

    The SQL used in a PreparedStatement is precompiled on the driver. From that point on, the parameters are sent to the driver as literal values and not executable portions of SQL; thus no SQL can be injected using a parameter. Another beneficial side effect of PreparedStatements (precompilation + sending only parameters) is improved performance when running the statement multiple times even with different values for the parameters (assuming that the driver supports PreparedStatements) as the driver does not have to perform SQL parsing and compilation each time the parameters change.

    0 讨论(0)
提交回复
热议问题