On 6/7/25 14:18, Glen K wrote:
>> I don't believe that this would move the needle on SQL-injection
> safety by enough to be worth doing. An injection attack is normally
> trying to break out of a quoted string, not a comment.
>
> Yes, SQL injections frequently involve escaping quoted strings, but if
> you do a search for SQL injection examples, you will find that most of
> them (I would say 90% or more) also use comments to remove the remainder
> of the SQL statement from consideration. Here is one example where an
> attacker specifies "admin'--;" as the username:
>
> SELECT * FROM members WHERE username = 'admin'--;' AND password =
> 'password';
>
> The comment in this example removes the password from inclusion in the
> statement, allowing the attacker to login as admin without a password.
Really?
select username, first_name, last_name from auth_user where username =
'aklaver';
username | first_name | last_name
----------+------------+-----------
aklaver | Adrian | Klaver
select username, first_name, last_name from auth_user where username =
'aklaver--;' and password = 'password';
username | first_name | last_name
----------+------------+-----------
(0 rows)
What authentication system are you using that does not actually verify
the password and allows entry for a zero return result?
--
Adrian Klaver
adrian.klaver@aklaver.com