sql injections through orm
This commit is contained in:
parent
f58719ad6a
commit
a5459ae447
|
@ -0,0 +1,49 @@
|
|||
# Object Relational Model (ORM)
|
||||
|
||||
Direct user input through the ORM may contain vulnerabilities we can exploit.
|
||||
There are vulnerabilities similar to raw SQL queries, when not validating and
|
||||
sanitizing properly.
|
||||
|
||||
During static code analysis, check the following vulnerable methods.
|
||||
|
||||
The payload is essentially the same as in pure SQL injections.
|
||||
|
||||
**Python Django**
|
||||
|
||||
```python
|
||||
extra()
|
||||
raw ()
|
||||
```
|
||||
|
||||
**Node.js Sequelize**
|
||||
|
||||
```javascript
|
||||
sequelize.query()
|
||||
```
|
||||
|
||||
**PHP Eloquent ORM**
|
||||
|
||||
```PHP
|
||||
whereRaw()
|
||||
DB::raw()
|
||||
```
|
||||
|
||||
**Ruby on Rails Active Record**
|
||||
|
||||
```ruby
|
||||
where("name = '#{input}'")
|
||||
```
|
||||
|
||||
**Java Spring Hibernate**
|
||||
|
||||
```Java
|
||||
createQuery()
|
||||
```
|
||||
|
||||
## Identify the Framework in Use
|
||||
|
||||
Check the website's cookies and HTTP headers. Review the page source and see if
|
||||
you can find indicators like links and version numbers. Look for error messages
|
||||
sent as a response to the queries.
|
||||
|
||||
|
Loading…
Reference in New Issue