Microsoft is aware of a recent escalation in a class of attacks targeting Web sites that use Microsoft ASP and ASP.NET technologies but do not follow best practices for secure Web application development. These SQL injection attacks do not exploit a specific software vulnerability, but instead target Web sites that do not follow secure coding practices for accessing and manipulating data stored in a relational database. When a SQL injection attack succeeds, an attacker can compromise data stored in these databases and possibly execute remote code. Clients browsing to a compromised server could be forwarded unknowingly to malicious sites that may install malware on the client machine.
Mitigating Factors:
This vulnerability is not exploitable in Web applications that follow generally accepted best practices for secure Web application development by verifying user data input.
Reference : Pinal Dave (https://blog.sqlauthority.com)
3 Comments. Leave new
Hi Pinal
I am a Team Leader in one private company.
I feel Good on reading your blog.
It is very much useful to me to review the SQL Once again
I need to know how to avoid the SQL injection through SQL
I made that Blocking Script in the ASP through regEx but i need to know that is possible in SQL ? If Possible How?
Mail To me.
Help Me PLease !
Thanks in Advance!!!
Here is another approach that uses derived table to avoid sql injection. Refer this for more details
Hi Pinal,
Its a nice blog for SQL Injection.
Thanks.