U.S. Flag Official website of the Department of Homeland Security

Practical Identification of SQL Injection Vulnerabilities

Original release date: October 25, 2012 | Last revised: February 06, 2013

Overview

The class of vulnerabilities known as SQL injection continues to present an extremely high risk in the current network threat landscape. In 2011, SQL injection was ranked first on the MITRE Common Weakness Enumeration (CWE)/SANS Top 25 Most Dangerous Software Errors list. Exploitation of these vulnerabilities has been implicated in many recent high-profile intrusions.

Although there is an abundance of good literature in the community about how to prevent SQL injection vulnerabilities, much of this documentation is geared toward web application developers. This advice is of limited benefit to IT administrators who are merely responsible for the operation of targeted web applications. This document provides concrete guidance about using open source tools and techniques to independently identify common SQL injection vulnerabilities, mimicking the approaches of attackers at large. The paper also highlights testing tools and illustrates the critical results of testing.

View Publication



Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top