Unit-6 Discussion Forum
Unit-6 Discussion Forum
Injection vulnerabilities occur when untrusted data, such as user input, is used in
is SQL injection, where attackers manipulate dynamic queries to execute unintended actions
in the database (A03 Injection - OWASP Top 10:2021, n.d.). For instance, if an application
takes user input directly to form a SQL query without parameterization, attackers can modify
the input to perform malicious activities. This vulnerability exists because the application
The main goal of injection attacks is to take control of an application’s database or server
by executing unauthorized commands. Attackers can retrieve, alter, or delete sensitive data,
disrupt operations, or even gain administrative access. A simple SQL injection, for instance,
could allow attackers to dump an entire database or change stored information (A03 Injection
- OWASP Top 10:2021, n.d.). In the worst-case scenario, the attack can lead to full system
compromise.
Preventing injection attacks involves ensuring that user-supplied data is kept separate
from commands or queries. The use of parameterized queries, stored procedures, and Object
Relational Mapping (ORM) tools are some effective strategies. Additionally, input validation
should be performed on the server-side to filter out any dangerous characters, though this
alone is not enough (A03 Injection - OWASP Top 10:2021, n.d.). Special care must be taken
in cases where applications accept inputs with special characters. Using SQL controls like
2
LIMIT can also restrict the scope of any potential attack by limiting the amount of data
returned.
A significant SQL injection attack was reported between November and December 2023,
where a hacking group named ResumeLooters compromised over 65 websites and stole more
than two million email addresses and personal information. The hackers primarily used SQL
injection to extract sensitive data from databases, targeting retail and recruitment websites
across countries such as India, Taiwan, Thailand, and others. ResumeLooters sold the stolen
data on Chinese-speaking hacking groups, which included emails, phone numbers, and
employment history of job seekers. This attack, fueled by poor security practices, highlights
how easily accessible tools can cause extensive damage when proper countermeasures are not
References:
Arghire, I. (2024, February 6). Millions of user records stolen from 65 websites via SQL
records-stolen-from-65-websites-via-sql-injection-attacks/