Preventing SQL Injection Attacks

Tutorial 3 of 5

Tutorial: Preventing SQL Injection Attacks

1. Introduction

SQL Injection is a common security vulnerability that uses malicious SQL code for backend database manipulation to access information not intended to be displayed. This tutorial aims to help you understand how to protect your web applications from SQL Injection attacks.

By the end of this tutorial, you will:

  • Understand what SQL Injection is and how it works
  • Learn how to protect your web applications from SQL Injection attacks

Prerequisites:
- Basic understanding of SQL and web development
- Familiarity with a server-side language like PHP, Java, or .NET

2. Step-by-Step Guide

SQL Injection can occur whenever your application uses input to construct SQL statements. Protecting against it involves preventing untrusted input from being interpreted as part of a SQL command.

Parameterized Queries/Prepared Statements

The best way to prevent SQL Injection is to use parameterized queries also known as Prepared Statements. This method ensures that an attacker can't change the intent of a query, even if SQL commands are inserted into the query.

Use of ORM Frameworks

Object Relational Mapping (ORM) frameworks allow for a database to be manipulated using the object-oriented paradigm of your preferred programming language. This ensures that any SQL is automatically parameterized, preventing SQL injection.

Regular Expressions

Using regular expressions can help validate user input and ensure it doesn't contain any dangerous syntax.

3. Code Examples

Example 1 - Parameterized Query using PHP & MySQLi:

// Assume we are getting user ID from user input
$user_id = $_GET['id'];

// Create a prepared statement
$stmt = $mysqli->prepare("SELECT * FROM Users WHERE Id = ?");

// Bind parameters
$stmt->bind_param("i", $user_id);

// Execute query
$stmt->execute();

// ... Fetch results and work with them

In this example, the "?" is a placeholder for $user_id. Even if a user tries to append a SQL command to the 'id' parameter, it won't be executed because it is treated as a string and not part of the SQL command.

Example 2 - Using an ORM (Python & SQLAlchemy):

# Get user input
user_id = request.form.get('id')

# Query database securely
user = session.query(User).filter(User.id==user_id).first()

Here, even if the 'id' parameter contains SQL commands, SQLAlchemy will ensure they're treated as strings and not part of the SQL command.

4. Summary

In this tutorial, we learned about SQL Injection and how it can exploit your application. The key to preventing SQL Injection attacks lies in keeping untrusted data separate from commands and queries. We also looked at using parameterized queries, ORMs, and regular expressions as techniques to prevent SQL Injection.

To learn more about SQL Injection, you can refer to the OWASP guide here.

5. Practice Exercises

Exercise 1:
Try to create a login form and protect it from SQL Injection using parameterized queries.

Exercise 2:
Use an ORM framework to query a database and protect it from SQL Injection.

Solutions:

Exercise 1 Solution:

// Assume we are getting username and password from user input
$username = $_POST['username'];
$password = $_POST['password'];

// Create a prepared statement
$stmt = $mysqli->prepare("SELECT * FROM Users WHERE username = ? AND password = ?");

// Bind parameters
$stmt->bind_param("ss", $username, $password);

// Execute query
$stmt->execute();

// ... Fetch results and work with them

Exercise 2 Solution:

# Get user input
username = request.form.get('username')
password = request.form.get('password')

# Query database securely
user = session.query(User).filter(User.username==username, User.password==password).first()

Remember, the above examples are simplified for understanding. In a real-world scenario, you should never store passwords in plain text. Always hash and salt your passwords before storing them.