D
David W. Fenton
It's common to think that the dangers of SQL injection are limited
to web applications, but the fact is, they are not. I had never
given the possibility much thought until I saw this thread on
StackOverflow.com:
http://stackoverflow.com/questions/512174/non-web-sql-injection
I was skeptical about how dangerous it could be, since the biggest
dangers in SQL injection come from user input that manages to change
the SQL string to include multiple SQL statements (see the cartoon
about the kid whose name is "Robert'); DROP TABLE Students;"), but
there are still possible dangers from SELECT statements that could
be exploited to return all rows in a table. With sensitive data,
this could be a problem.
I wrote a long post considering the issues in Access. The whole
subject is worthy of significant consideration and discussion by
Access developers, I think.
to web applications, but the fact is, they are not. I had never
given the possibility much thought until I saw this thread on
StackOverflow.com:
http://stackoverflow.com/questions/512174/non-web-sql-injection
I was skeptical about how dangerous it could be, since the biggest
dangers in SQL injection come from user input that manages to change
the SQL string to include multiple SQL statements (see the cartoon
about the kid whose name is "Robert'); DROP TABLE Students;"), but
there are still possible dangers from SELECT statements that could
be exploited to return all rows in a table. With sensitive data,
this could be a problem.
I wrote a long post considering the issues in Access. The whole
subject is worthy of significant consideration and discussion by
Access developers, I think.