
User provided input is transmitted to the web-server in the form of a parameter statement. Web applications are comprised of either software programs or web-pages that are retained within a web-server.

Collectively web applications share one crucial characteristic, their interactive database-driven nature. Web-based applications are a multi-tiered deployment. However, the exploitation of SQL injection vulnerabilities is predominantly conducted by an attacker upon web application frameworks. SQL injection vulnerabilities can occur across any software application platform. Consequently, the data is used to construct malevolent SQL query statements, which are subsequently executed on the underlying application database. SQL injection vulnerabilities are generated by the inability of a software application to authorize and sanitize user provided data which originates from an untrusted source. Vulnerabilities encapsulates any error, loophole, bug, flaw or weakness residing within a software application, that holds the prospective for exploitation by a malicious entity in order to ascertain the unauthorized access to either application and/or the application data. SQL permits the user the capacity to insert, update, query and delete database stored data. Developed in the 1970’s SQL, is a declarative language, encompassing features such as expression, clauses, statements, queries, and predicates.


Structured Query Language (SQL) is a commonly deployed high-level query language utilized for the updating and querying of relational Database Management Systems (DBMS). This exposes a myriad of security, accuracy and functionality concerns which remain latent throughout application development. However, development environments are restricted in their understanding of concurrent database and application interactions. Databases are widely employed within modern day software applications. Thus, the identification of vulnerabilities and assurance of security functionality is an extensively implemented methodology used to assess and progress the security of software applications. Share this: Facebook Facebook logo Twitter Twitter logo Reddit Reddit logo LinkedIn LinkedIn logo WhatsApp WhatsApp logo TABLE OF CONTENTSĢ.0 SQL Injection Vulnerability Detectionīreaches in security occur as a result of the exploitation of vulnerabilities within applications.
