You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/pentesting-web/sql-injection/README.md
+28Lines changed: 28 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -652,6 +652,33 @@ Mitigations:
652
652
- Never concatenate identifiers from user input. Map allowed column names to a fixed allow-list and quote identifiers properly.
653
653
- If dynamic table access is required, restrict to a finite set and resolve server-side from a safe mapping.
654
654
655
+
656
+
### SQLi via AST/filter-to-SQL converters (JSON_VALUE predicates)
657
+
658
+
Some frameworks **convert structured filter ASTs into raw SQL boolean fragments** (e.g., metadata filters or JSON predicates) and then**string-concatenate** those fragments into larger queries. If the converter **wraps string values as `'%s'` without escaping**, a single quote in user input terminates the literal and the rest is parsed as SQL.
0 commit comments