Call now: (800) 766-1884  



 Home


 SQL Server Tips
 SQL Server Training

 SQL Server Consulting
 SQL Server Support
 SQL Server Remote DBA



 Articles
 Services
 SQL Server Scripts
 Scripts Menu



 

 

 

   
  SQL Server Tips by Gama and Naughter


Wrapping Up 

SQL injection attacks are very dangerous and need not only to be fully contained but also to be logged. A few basic rules for containing the attacks: 

1. Replace each single quote with two single quotes.

2. If the input reached the maximum length of the field, check for a single quote on the right, if it exists, then remove all the single quotes on the right side.

3. Removing TSQL comments -- and /* */ is not a good practice because it might result in data corruption. These should be detected and logged, though.

4. Detecting TSQL keywords such as UNION SELECT, SHUTDOWN, etc… and logging the input data and user info is recommended.

5. Having validation in the client side is ok but all the input must be validated again on the server side.

6. Using more elaborate SQL constructs might help in some cases. For example using IF EXISTS before the SELECT statement could cause an error that would prevent the injected code to execute. This is recommended when the extra overhead is affordable.

7. Checking the number of records in the working recordset might detect some attacks. For example, when getting the user name from the log name and password, there should be zero records if it does not match or one record if it does. Any other number could very well be an attack that caused the SELECT statement to return all records instead one just one.

8. Bad policies are more dangerous than any attacker because they are always there, like a time bomb waiting for a party crasher to play with it. A simple rule of thumb is: if the input will not modify any data (like the user authentication or the Northwind query examples) then the login should have read only permissions; if data will be modified then it should have write permissions.


The above book excerpt is from:

Super SQL Server Systems
Turbocharge Database Performance with C++ External Procedures

ISBN: 0-9761573-2-2
Joseph Gama, P. J. Naughter

 http://www.rampant-books.com/book_2005_2_sql_server_external_procedures.htm
 

 

Burleson Consulting Remote DB Administration


 

 


 

 

 

 

 
Burleson is the America's Team

Note: The pages on this site were created as a support and training reference for use by our staff of DBA consultants.  If you find it confusing, please exit this page.

Errata?  SQL Server technology is changing and we strive to update our SQL Server support information.  If you find an error or have a suggestion for improving our content, we would appreciate your feedback.  Just  e-mail:and include the URL for the page.
 


Burleson Consulting
SQL Server database support

 

Copyright © 1996 -  2013 by Vaaltech Web Services. All rights reserved.

Hit Counter