Using Parameterized Query to Avoid SQL Injection

Introduction

To understand why you need to use a parameterized query to avoid SQL Injection over a concatenated inline query you need to understand SQL Injection.

SQL Injection

In SQL Injection, when an end user sends some invalid input to a CRUD operation or forcibly executes the wrong query into the database, that can be harmful for the database.

Harmful means "data loss" or "invalid inputs".

To learn more, use the following procedure.

Step 1

Create a table named "Login" in any database.

  1. create table User_Login  
  2. (  
  3.    UserID varchar(20),  
  4.    Pwd varchar(20)  
  5. )  
table

Now save some user credentials into the database for login purposes and select the table.
  1. insert into user_login values('rahul','bansal@123')  
  2. insert into user_login values('bansal','rahul@123')  
query

Step 2

Create a website named "Website1".

empty website

Now I will create a login page named "Default.aspx" to validate the credentials from the "Login" table and if the user is valid then redirect to it to the next page named "Home.aspx".

Add 2 textboxes for UserID and Password respectively and a button for login.

user ID

Add 2 namespaces in the .cs file of the "Default.aspx".
  1. using System.Data.SqlClient;  
  2. using System.Data;  
Now add the following code to validate the credentials from the database on the click event of the Login button.
  1. protected void btn_Login_Click(object sender, EventArgs e)   
  2. {  
  3.     string constr = System.Configuration.ConfigurationManager.ConnectionStrings["Constr"].ConnectionString;  
  4.     SqlConnection con = new SqlConnection(constr);  
  5.     string sql = "select count(UserID) from user_login where UserID='" + txtUSerID.Text + "' and pwd='" + txtPwd.Text + "'";  
  6.     SqlCommand cmd = new SqlCommand(sql, con);  
  7.     con.Open();  
  8.     object res = cmd.ExecuteScalar();  
  9.     con.Close();  
  10.     if (Convert.ToInt32(res) > 0) Response.Redirect("Home.aspx");  
  11.     else   
  12.     {  
  13.         Response.Write("Invalid Credentials");  
  14.         return;  
  15.     }  
  16. }  
validate the credentials

Add a new page named "Home.aspx".

web form

Where any valid user will get a welcome message.

code

Step 3

Now run the "Default" page and log in with valid credentials.

Default page

It will redirect to the next page "Home.aspx" for valid user.

redirect to next page

Note: 
  1. Here I have not used the TextMode="Password" property in the password TextBox to show the password.
  2. I have not used any input validations to explain my example.

Problem: Now I will do the SQL injection with some invalid credentials with successful query execution and then I will redirect to the next page "Home.aspx" as a valid user.

I will enter a string in both textboxes like the following:

    ‘ or ‘1’=’1

Now run the page and login with the preceding string in both textboxes.

run the page and login

It will redirect to next page name "Home.aspx" for valid user.

Home page

See what happened. This is called SQL injection in the hacking world.

Reason

It happened just because of the string and after filling in this string in both textboxes our SQL query became like the following:

select count(UserID) from user_login where UserID='' or '1'='1' and pwd='' or '1'='1'

That will provide the UserID count and that is 2 in the table because 2 users are in the "user_login" table.

It can be used in more ways like just fill in the following string only in the User ID TextBox and you will go the next page as a valid user.

    or 1=1 - -

And it will also provide users count 2 because SQLquery will become like the following:

select count(UserID) from user_login where UserID='' or 1=1 --' and pwd='' or '1'='1'

Note: The sign -- are for commenting the preceding text in SQL.

It can be more harmful or dangerous when the invalid user/hacker executes a script to drop all tables in the database or drop an entire database.

Solution

To resolve this issue you need to do 2 things:

  1. Always use a parameterized query.
  2. Input validations on both the client and server side.

Sometimes if your input validation fails then parameterized will not execute any scripted value.

Let's see the example.

  1. protected void btn_Login_Click(object sender, EventArgs e)   
  2. {  
  3.     string constr = System.Configuration.ConfigurationManager.ConnectionStrings["Constr"].ConnectionString;  
  4.     SqlConnection con = new SqlConnection(constr);  
  5.     string sql = "select count(UserID) from user_login where UserID=@UserID and pwd=@pwd";  
  6.     SqlCommand cmd = new SqlCommand(sql, con);  
  7.     SqlParameter[] param = new SqlParameter[2];  
  8.     param[0] = new SqlParameter("@UserID", txtUSerID.Text);  
  9.     param[1] = new SqlParameter("@pwd", txtPwd.Text);  
  10.     cmd.Parameters.Add(param[0]);  
  11.     cmd.Parameters.Add(param[1]);  
  12.     con.Open();  
  13.     object res = cmd.ExecuteScalar();  
  14.     con.Close();  
  15.     if (Convert.ToInt32(res) > 0) Response.Redirect("Home.aspx");  
  16.     else   
  17.     {  
  18.         Response.Write("Invalid Credentials");  
  19.         return;  
  20.     }  
  21. }  
Input validations

Now if I run the page and try to login with SQL scripts as done earlier.

With ‘ or ‘1’=’1

login

With ' or 1=1 - -

run the page

As you have seen, the parameterized didn't execute the SQL Script, but why?

Reason: The reason behind this is the parameterized query would not be vulnerable and would instead look for a user id or password that literally matched the entire string.

In other words "The SQL engine checks each parameter to ensure that it is correct for its column and are treated literally and not as part of the SQL to be executed".

Conclusion: Always use a parameterized query and input validations on both the client and server side. 

Up Next
    Ebook Download
    View all
    Learn
    View all