Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix #474 - Remove SQL LIMIT Command #721

Open
wants to merge 2 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 0 additions & 1 deletion 2017/en/0xa1-injection.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,6 @@ Preventing injection requires keeping data separate from commands and queries.
* The preferred option is to use a safe API, which avoids the use of the interpreter entirely or provides a parameterized interface, or migrate to use Object Relational Mapping Tools (ORMs). **Note**: Even when parameterized, stored procedures can still introduce SQL injection if PL/SQL or T-SQL concatenates queries and data, or executes hostile data with EXECUTE IMMEDIATE or exec().
* Use positive or "whitelist" server-side input validation. This is not a complete defense as many applications require special characters, such as text areas or APIs for mobile applications.
* For any residual dynamic queries, escape special characters using the specific escape syntax for that interpreter. **Note**: SQL structure such as table names, column names, and so on cannot be escaped, and thus user-supplied structure names are dangerous. This is a common issue in report-writing software.
* Use LIMIT and other SQL controls within queries to prevent mass disclosure of records in case of SQL injection.

## Example Attack Scenarios

Expand Down
3 changes: 0 additions & 3 deletions 2021/docs/A03_2021-Injection.md
Original file line number Diff line number Diff line change
Expand Up @@ -62,9 +62,6 @@ Preventing injection requires keeping data separate from commands and queries:
cannot be escaped, and thus user-supplied structure names are
dangerous. This is a common issue in report-writing software.

- Use LIMIT and other SQL controls within queries to prevent mass
disclosure of records in case of SQL injection.

## Example Attack Scenarios

**Scenario #1:** An application uses untrusted data in the construction
Expand Down