Sql injection attacks

Поиск
Список
Период
Сортировка
От Geoff Caplan
Тема Sql injection attacks
Дата
Msg-id 34204823911.20040719201428@variosoft.com
обсуждение исходный текст
Ответы Re: Sql injection attacks  (Peter Eisentraut <peter_e@gmx.net>)
Re: Sql injection attacks  (Bill Moran <wmoran@potentialtech.com>)
Список pgsql-general
Hi folks,

I'm new to Postgres and trying to get up to speed on the security
issues. There seems to be remarkably little Postgres specific stuff on
preventing SQL injection attacks.

Most of the online literature is on MS SQL Server. There, the
consensus seems to be that the range of potential attacks is so wide
that attempting to spot attack signatures in posted data is a doomed
enterprise, and that the safest general approach for any dynamically
built query is to execute it as a stored procedure.

In SQL Server, this reportedly works because the syntax of the query
is pre-compiled, and the variables passed in are treated strictly as
data and cannot alter the syntax. So any malicious use of "AND",
"UNION", ";" etc in submitted data will fail.

Can anyone confirm that this would also apply to Postgres Query
Language (SQL) functions? The effectiveness of moving the queries into
the database against SQL injection attack would seem to depend on the
query engine internals. Will using the SQL functions provide the
robust protection I am looking for?

------------------
Geoff Caplan
Vario Software Ltd
(+44) 121-515 1154


В списке pgsql-general по дате отправления:

Предыдущее
От: Matt Wong
Дата:
Сообщение: help dealing with pghoster, who is gone with my data
Следующее
От: Chuck Bearden
Дата:
Сообщение: Re: Horology & stats tests fail in 7.4.3/RH 9