Column name in SQL query from request











up vote
0
down vote

favorite












I was given a task to rewrite an old web API.



This API reads SQL queries from the database.



There's literally a view with "Queries" in the name which contains "SqlText" column.



SELECT SqlText FROM Queries WHERE QueryID = 123


The "SqlText" contains only simple SQL queries in the format SELECT [columns] FROM [table] by convention.



The query is altered depending on the URL parameters in the request. The result of this query is then shown as result.



string parsedColumns = ParseColumns(queryRow); //contains "Column1, Column2";
string parsedTable = ParseTable(queryRow); //contains "SomeTable"

string requestColumns = HttpContext.Request["columns"];
string sqlColumns = requestColumns ?? parsedColumns;

string col1Condition = HttpContext.Request["Column1"]
string col2Condition = HttpContext.Request["Column2"]

string sqlQuery = "SELECT " + sqlColumns
+ " FROM " + parsedTable
+ " WHERE Column1 = " + col1Condition
+ " AND Column2 = " + col2Condition;


This is obvious SQL injection issue so I started rewritting it.



Now there are three other problems.




  • I cannot change the structure of the database or the convention

  • The database is either Oracle or SQL Server

  • I don't know how to correctly work with the "columns" URL parameter to avoid SQL injection.


It's easy to convert the URL parameters in the WHERE clause to the SQL parameters for both SQL Server and Oracle.



SQL Server



var sqlCommand = new SqlCommand("SELECT * FROM SomeTable WHERE Condition1 = @con1 AND Condition2 = @con2");


Oracle



var oracleCommand = new OracleCommand("SELECT * FROM SomeTable WHERE Condition1 = :con1 AND Condition2 = :con2");


Column identifiers



The problem is with the HttpContext.Request["columns"]. I still need to somehow alter the SQL query string with URL parameters which I don't like at all.



To simplify the issue, let's consider a single column from URL request.



string column = HttpContext.Request["column"];
var cmd = new SqlCommand($"SELECT {column} FROM ...");


I know that in SQL Server the identifier can be surrounded by braces. So my line of thinking is that I'm safe if I strip all braces from the column.



string column = HttpContext.Request["column"];
column = column.Replace("[", "").Replace("]", "");
column = $"[{column}]";
var cmd = new SqlCommand($"SELECT {column} FROM ...");


Oracle uses quotation marks.



string column = HttpContext.Request["column"];
column = column.Replace(""", "");
column = $""{column}"";
var cmd = new OracleCommand($"SELECT {column} FROM ...");


The question




  • Is this sql-injection safe enough?

  • Or is this use case inherently sql-injection unsafe?










share|improve this question






















  • The quote characters in SQL Server are brackets () not braces ({}). Even so, simply wrapping the value of a dynamic value with a brackets doesn't make it safe; as the person passing the injection string would simply pass a ] as part of their string (ending the quote). Personally, i prefer to handle dynamic SQL the SQL Server side of things, and pass a parametrised query to the SQL Instance.
    – Larnu
    2 days ago






  • 2




    This still feels vulnerable to injection, to me at least. I guess you could check the existance of the column in INFORMATION_SCHEMA.COLUMNS (using a properly parameterised query!) before you allow it to be used in a query, but it still feels risky.
    – Diado
    2 days ago












  • Actually Larnu, he is stripping out the "]" character so even if they pass in a "]" it won't make it to the query. And the braces he is using to add the value of column into the string as per c#. I agree with Diado though that it still feels vulnerable. Can you guarantee that column names will not have spaces? You could strip out all characters other than alphanumeric and underscore if that is the case. May make it secure. Still not positive though.
    – MikeS
    2 days ago










  • Yes I meant brackets not braces. Also yeah, I completely forgot dynamic SQL calls exist, thank you!
    – Mirek
    2 days ago










  • I would handle the data validation all in c#... pass NOTHING to SQL before its checked out. parse the columns; strip the [ ] and split it into an array/list, then one by one - check that list against information_schema.tables/information_schema.columns, and chuck out any that don't exist/match (avoids errors too), THEN build the command variable and build the string to execute.
    – Dave Cullum
    2 days ago

















up vote
0
down vote

favorite












I was given a task to rewrite an old web API.



This API reads SQL queries from the database.



There's literally a view with "Queries" in the name which contains "SqlText" column.



SELECT SqlText FROM Queries WHERE QueryID = 123


The "SqlText" contains only simple SQL queries in the format SELECT [columns] FROM [table] by convention.



The query is altered depending on the URL parameters in the request. The result of this query is then shown as result.



string parsedColumns = ParseColumns(queryRow); //contains "Column1, Column2";
string parsedTable = ParseTable(queryRow); //contains "SomeTable"

string requestColumns = HttpContext.Request["columns"];
string sqlColumns = requestColumns ?? parsedColumns;

string col1Condition = HttpContext.Request["Column1"]
string col2Condition = HttpContext.Request["Column2"]

string sqlQuery = "SELECT " + sqlColumns
+ " FROM " + parsedTable
+ " WHERE Column1 = " + col1Condition
+ " AND Column2 = " + col2Condition;


This is obvious SQL injection issue so I started rewritting it.



Now there are three other problems.




  • I cannot change the structure of the database or the convention

  • The database is either Oracle or SQL Server

  • I don't know how to correctly work with the "columns" URL parameter to avoid SQL injection.


It's easy to convert the URL parameters in the WHERE clause to the SQL parameters for both SQL Server and Oracle.



SQL Server



var sqlCommand = new SqlCommand("SELECT * FROM SomeTable WHERE Condition1 = @con1 AND Condition2 = @con2");


Oracle



var oracleCommand = new OracleCommand("SELECT * FROM SomeTable WHERE Condition1 = :con1 AND Condition2 = :con2");


Column identifiers



The problem is with the HttpContext.Request["columns"]. I still need to somehow alter the SQL query string with URL parameters which I don't like at all.



To simplify the issue, let's consider a single column from URL request.



string column = HttpContext.Request["column"];
var cmd = new SqlCommand($"SELECT {column} FROM ...");


I know that in SQL Server the identifier can be surrounded by braces. So my line of thinking is that I'm safe if I strip all braces from the column.



string column = HttpContext.Request["column"];
column = column.Replace("[", "").Replace("]", "");
column = $"[{column}]";
var cmd = new SqlCommand($"SELECT {column} FROM ...");


Oracle uses quotation marks.



string column = HttpContext.Request["column"];
column = column.Replace(""", "");
column = $""{column}"";
var cmd = new OracleCommand($"SELECT {column} FROM ...");


The question




  • Is this sql-injection safe enough?

  • Or is this use case inherently sql-injection unsafe?










share|improve this question






















  • The quote characters in SQL Server are brackets () not braces ({}). Even so, simply wrapping the value of a dynamic value with a brackets doesn't make it safe; as the person passing the injection string would simply pass a ] as part of their string (ending the quote). Personally, i prefer to handle dynamic SQL the SQL Server side of things, and pass a parametrised query to the SQL Instance.
    – Larnu
    2 days ago






  • 2




    This still feels vulnerable to injection, to me at least. I guess you could check the existance of the column in INFORMATION_SCHEMA.COLUMNS (using a properly parameterised query!) before you allow it to be used in a query, but it still feels risky.
    – Diado
    2 days ago












  • Actually Larnu, he is stripping out the "]" character so even if they pass in a "]" it won't make it to the query. And the braces he is using to add the value of column into the string as per c#. I agree with Diado though that it still feels vulnerable. Can you guarantee that column names will not have spaces? You could strip out all characters other than alphanumeric and underscore if that is the case. May make it secure. Still not positive though.
    – MikeS
    2 days ago










  • Yes I meant brackets not braces. Also yeah, I completely forgot dynamic SQL calls exist, thank you!
    – Mirek
    2 days ago










  • I would handle the data validation all in c#... pass NOTHING to SQL before its checked out. parse the columns; strip the [ ] and split it into an array/list, then one by one - check that list against information_schema.tables/information_schema.columns, and chuck out any that don't exist/match (avoids errors too), THEN build the command variable and build the string to execute.
    – Dave Cullum
    2 days ago















up vote
0
down vote

favorite









up vote
0
down vote

favorite











I was given a task to rewrite an old web API.



This API reads SQL queries from the database.



There's literally a view with "Queries" in the name which contains "SqlText" column.



SELECT SqlText FROM Queries WHERE QueryID = 123


The "SqlText" contains only simple SQL queries in the format SELECT [columns] FROM [table] by convention.



The query is altered depending on the URL parameters in the request. The result of this query is then shown as result.



string parsedColumns = ParseColumns(queryRow); //contains "Column1, Column2";
string parsedTable = ParseTable(queryRow); //contains "SomeTable"

string requestColumns = HttpContext.Request["columns"];
string sqlColumns = requestColumns ?? parsedColumns;

string col1Condition = HttpContext.Request["Column1"]
string col2Condition = HttpContext.Request["Column2"]

string sqlQuery = "SELECT " + sqlColumns
+ " FROM " + parsedTable
+ " WHERE Column1 = " + col1Condition
+ " AND Column2 = " + col2Condition;


This is obvious SQL injection issue so I started rewritting it.



Now there are three other problems.




  • I cannot change the structure of the database or the convention

  • The database is either Oracle or SQL Server

  • I don't know how to correctly work with the "columns" URL parameter to avoid SQL injection.


It's easy to convert the URL parameters in the WHERE clause to the SQL parameters for both SQL Server and Oracle.



SQL Server



var sqlCommand = new SqlCommand("SELECT * FROM SomeTable WHERE Condition1 = @con1 AND Condition2 = @con2");


Oracle



var oracleCommand = new OracleCommand("SELECT * FROM SomeTable WHERE Condition1 = :con1 AND Condition2 = :con2");


Column identifiers



The problem is with the HttpContext.Request["columns"]. I still need to somehow alter the SQL query string with URL parameters which I don't like at all.



To simplify the issue, let's consider a single column from URL request.



string column = HttpContext.Request["column"];
var cmd = new SqlCommand($"SELECT {column} FROM ...");


I know that in SQL Server the identifier can be surrounded by braces. So my line of thinking is that I'm safe if I strip all braces from the column.



string column = HttpContext.Request["column"];
column = column.Replace("[", "").Replace("]", "");
column = $"[{column}]";
var cmd = new SqlCommand($"SELECT {column} FROM ...");


Oracle uses quotation marks.



string column = HttpContext.Request["column"];
column = column.Replace(""", "");
column = $""{column}"";
var cmd = new OracleCommand($"SELECT {column} FROM ...");


The question




  • Is this sql-injection safe enough?

  • Or is this use case inherently sql-injection unsafe?










share|improve this question













I was given a task to rewrite an old web API.



This API reads SQL queries from the database.



There's literally a view with "Queries" in the name which contains "SqlText" column.



SELECT SqlText FROM Queries WHERE QueryID = 123


The "SqlText" contains only simple SQL queries in the format SELECT [columns] FROM [table] by convention.



The query is altered depending on the URL parameters in the request. The result of this query is then shown as result.



string parsedColumns = ParseColumns(queryRow); //contains "Column1, Column2";
string parsedTable = ParseTable(queryRow); //contains "SomeTable"

string requestColumns = HttpContext.Request["columns"];
string sqlColumns = requestColumns ?? parsedColumns;

string col1Condition = HttpContext.Request["Column1"]
string col2Condition = HttpContext.Request["Column2"]

string sqlQuery = "SELECT " + sqlColumns
+ " FROM " + parsedTable
+ " WHERE Column1 = " + col1Condition
+ " AND Column2 = " + col2Condition;


This is obvious SQL injection issue so I started rewritting it.



Now there are three other problems.




  • I cannot change the structure of the database or the convention

  • The database is either Oracle or SQL Server

  • I don't know how to correctly work with the "columns" URL parameter to avoid SQL injection.


It's easy to convert the URL parameters in the WHERE clause to the SQL parameters for both SQL Server and Oracle.



SQL Server



var sqlCommand = new SqlCommand("SELECT * FROM SomeTable WHERE Condition1 = @con1 AND Condition2 = @con2");


Oracle



var oracleCommand = new OracleCommand("SELECT * FROM SomeTable WHERE Condition1 = :con1 AND Condition2 = :con2");


Column identifiers



The problem is with the HttpContext.Request["columns"]. I still need to somehow alter the SQL query string with URL parameters which I don't like at all.



To simplify the issue, let's consider a single column from URL request.



string column = HttpContext.Request["column"];
var cmd = new SqlCommand($"SELECT {column} FROM ...");


I know that in SQL Server the identifier can be surrounded by braces. So my line of thinking is that I'm safe if I strip all braces from the column.



string column = HttpContext.Request["column"];
column = column.Replace("[", "").Replace("]", "");
column = $"[{column}]";
var cmd = new SqlCommand($"SELECT {column} FROM ...");


Oracle uses quotation marks.



string column = HttpContext.Request["column"];
column = column.Replace(""", "");
column = $""{column}"";
var cmd = new OracleCommand($"SELECT {column} FROM ...");


The question




  • Is this sql-injection safe enough?

  • Or is this use case inherently sql-injection unsafe?







c# sql-server oracle sql-injection






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked 2 days ago









Mirek

1,53711632




1,53711632












  • The quote characters in SQL Server are brackets () not braces ({}). Even so, simply wrapping the value of a dynamic value with a brackets doesn't make it safe; as the person passing the injection string would simply pass a ] as part of their string (ending the quote). Personally, i prefer to handle dynamic SQL the SQL Server side of things, and pass a parametrised query to the SQL Instance.
    – Larnu
    2 days ago






  • 2




    This still feels vulnerable to injection, to me at least. I guess you could check the existance of the column in INFORMATION_SCHEMA.COLUMNS (using a properly parameterised query!) before you allow it to be used in a query, but it still feels risky.
    – Diado
    2 days ago












  • Actually Larnu, he is stripping out the "]" character so even if they pass in a "]" it won't make it to the query. And the braces he is using to add the value of column into the string as per c#. I agree with Diado though that it still feels vulnerable. Can you guarantee that column names will not have spaces? You could strip out all characters other than alphanumeric and underscore if that is the case. May make it secure. Still not positive though.
    – MikeS
    2 days ago










  • Yes I meant brackets not braces. Also yeah, I completely forgot dynamic SQL calls exist, thank you!
    – Mirek
    2 days ago










  • I would handle the data validation all in c#... pass NOTHING to SQL before its checked out. parse the columns; strip the [ ] and split it into an array/list, then one by one - check that list against information_schema.tables/information_schema.columns, and chuck out any that don't exist/match (avoids errors too), THEN build the command variable and build the string to execute.
    – Dave Cullum
    2 days ago




















  • The quote characters in SQL Server are brackets () not braces ({}). Even so, simply wrapping the value of a dynamic value with a brackets doesn't make it safe; as the person passing the injection string would simply pass a ] as part of their string (ending the quote). Personally, i prefer to handle dynamic SQL the SQL Server side of things, and pass a parametrised query to the SQL Instance.
    – Larnu
    2 days ago






  • 2




    This still feels vulnerable to injection, to me at least. I guess you could check the existance of the column in INFORMATION_SCHEMA.COLUMNS (using a properly parameterised query!) before you allow it to be used in a query, but it still feels risky.
    – Diado
    2 days ago












  • Actually Larnu, he is stripping out the "]" character so even if they pass in a "]" it won't make it to the query. And the braces he is using to add the value of column into the string as per c#. I agree with Diado though that it still feels vulnerable. Can you guarantee that column names will not have spaces? You could strip out all characters other than alphanumeric and underscore if that is the case. May make it secure. Still not positive though.
    – MikeS
    2 days ago










  • Yes I meant brackets not braces. Also yeah, I completely forgot dynamic SQL calls exist, thank you!
    – Mirek
    2 days ago










  • I would handle the data validation all in c#... pass NOTHING to SQL before its checked out. parse the columns; strip the [ ] and split it into an array/list, then one by one - check that list against information_schema.tables/information_schema.columns, and chuck out any that don't exist/match (avoids errors too), THEN build the command variable and build the string to execute.
    – Dave Cullum
    2 days ago


















The quote characters in SQL Server are brackets () not braces ({}). Even so, simply wrapping the value of a dynamic value with a brackets doesn't make it safe; as the person passing the injection string would simply pass a ] as part of their string (ending the quote). Personally, i prefer to handle dynamic SQL the SQL Server side of things, and pass a parametrised query to the SQL Instance.
– Larnu
2 days ago




The quote characters in SQL Server are brackets () not braces ({}). Even so, simply wrapping the value of a dynamic value with a brackets doesn't make it safe; as the person passing the injection string would simply pass a ] as part of their string (ending the quote). Personally, i prefer to handle dynamic SQL the SQL Server side of things, and pass a parametrised query to the SQL Instance.
– Larnu
2 days ago




2




2




This still feels vulnerable to injection, to me at least. I guess you could check the existance of the column in INFORMATION_SCHEMA.COLUMNS (using a properly parameterised query!) before you allow it to be used in a query, but it still feels risky.
– Diado
2 days ago






This still feels vulnerable to injection, to me at least. I guess you could check the existance of the column in INFORMATION_SCHEMA.COLUMNS (using a properly parameterised query!) before you allow it to be used in a query, but it still feels risky.
– Diado
2 days ago














Actually Larnu, he is stripping out the "]" character so even if they pass in a "]" it won't make it to the query. And the braces he is using to add the value of column into the string as per c#. I agree with Diado though that it still feels vulnerable. Can you guarantee that column names will not have spaces? You could strip out all characters other than alphanumeric and underscore if that is the case. May make it secure. Still not positive though.
– MikeS
2 days ago




Actually Larnu, he is stripping out the "]" character so even if they pass in a "]" it won't make it to the query. And the braces he is using to add the value of column into the string as per c#. I agree with Diado though that it still feels vulnerable. Can you guarantee that column names will not have spaces? You could strip out all characters other than alphanumeric and underscore if that is the case. May make it secure. Still not positive though.
– MikeS
2 days ago












Yes I meant brackets not braces. Also yeah, I completely forgot dynamic SQL calls exist, thank you!
– Mirek
2 days ago




Yes I meant brackets not braces. Also yeah, I completely forgot dynamic SQL calls exist, thank you!
– Mirek
2 days ago












I would handle the data validation all in c#... pass NOTHING to SQL before its checked out. parse the columns; strip the [ ] and split it into an array/list, then one by one - check that list against information_schema.tables/information_schema.columns, and chuck out any that don't exist/match (avoids errors too), THEN build the command variable and build the string to execute.
– Dave Cullum
2 days ago






I would handle the data validation all in c#... pass NOTHING to SQL before its checked out. parse the columns; strip the [ ] and split it into an array/list, then one by one - check that list against information_schema.tables/information_schema.columns, and chuck out any that don't exist/match (avoids errors too), THEN build the command variable and build the string to execute.
– Dave Cullum
2 days ago














1 Answer
1






active

oldest

votes

















up vote
0
down vote













Since you are working with a basic program design that you cannot change what about just trying to add edits to the input to look for injection elements. For example if the input is a column name it will need to have a maximum length of 30 (before 12.x) characters and should not contain a semicolon or the strings " OR" or " AND" in them. While not a perfect solution this should be practical solution.






share|improve this answer





















    Your Answer






    StackExchange.ifUsing("editor", function () {
    StackExchange.using("externalEditor", function () {
    StackExchange.using("snippets", function () {
    StackExchange.snippets.init();
    });
    });
    }, "code-snippets");

    StackExchange.ready(function() {
    var channelOptions = {
    tags: "".split(" "),
    id: "1"
    };
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function() {
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled) {
    StackExchange.using("snippets", function() {
    createEditor();
    });
    }
    else {
    createEditor();
    }
    });

    function createEditor() {
    StackExchange.prepareEditor({
    heartbeatType: 'answer',
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader: {
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    },
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    });


    }
    });














     

    draft saved


    draft discarded


















    StackExchange.ready(
    function () {
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53415217%2fcolumn-name-in-sql-query-from-request%23new-answer', 'question_page');
    }
    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes








    up vote
    0
    down vote













    Since you are working with a basic program design that you cannot change what about just trying to add edits to the input to look for injection elements. For example if the input is a column name it will need to have a maximum length of 30 (before 12.x) characters and should not contain a semicolon or the strings " OR" or " AND" in them. While not a perfect solution this should be practical solution.






    share|improve this answer

























      up vote
      0
      down vote













      Since you are working with a basic program design that you cannot change what about just trying to add edits to the input to look for injection elements. For example if the input is a column name it will need to have a maximum length of 30 (before 12.x) characters and should not contain a semicolon or the strings " OR" or " AND" in them. While not a perfect solution this should be practical solution.






      share|improve this answer























        up vote
        0
        down vote










        up vote
        0
        down vote









        Since you are working with a basic program design that you cannot change what about just trying to add edits to the input to look for injection elements. For example if the input is a column name it will need to have a maximum length of 30 (before 12.x) characters and should not contain a semicolon or the strings " OR" or " AND" in them. While not a perfect solution this should be practical solution.






        share|improve this answer












        Since you are working with a basic program design that you cannot change what about just trying to add edits to the input to look for injection elements. For example if the input is a column name it will need to have a maximum length of 30 (before 12.x) characters and should not contain a semicolon or the strings " OR" or " AND" in them. While not a perfect solution this should be practical solution.







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered 2 days ago









        Mark D Powell

        861




        861






























             

            draft saved


            draft discarded



















































             


            draft saved


            draft discarded














            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53415217%2fcolumn-name-in-sql-query-from-request%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            What visual should I use to simply compare current year value vs last year in Power BI desktop

            Alexandru Averescu

            Trompette piccolo