Settings

Theme

Preventing SQL Injections When WAF’s Not Enough

cossacklabs.com

18 points by ninegunpi 7 years ago · 13 comments

Reader

dullgiulio 7 years ago

Umh, this article is dubious.

1. If your WAF can be fooled by adding a X-Forwarded-For header, trouble ahead.

2. If your security strategy is about mitigating attacks where the payload matches some regular expressions, trouble ahead. Machine learning? Double trouble ahead.

3. If you don't write only completely static queries[1] to then use as prepared statements or use a proper ORM[2] when using a SQL database, trouble ahead.

[1] https://www.akadia.com/services/dyn_modify_where_clause.html

[2] Like linq, jOOQ...

all_blue_chucks 7 years ago

WAF's are never good enough. They're a weak band-aid used by companies who lack the expertise to find and fix security bugs in their own code.

  • Lt_Riza_Hawkeye 7 years ago

    This is the correct answer. Unfortunately PCI dictates that you can use WAFs instead of real coding standards and testing.

    For anyone curious why WAFs are so useless, there is a very beginner-accessible talk by Joe McCray here: https://www.youtube.com/watch?v=qBVThFwdYTc

    • wil421 7 years ago

      The company I work at has many PCI compliant systems. I asked a security officer why they were still doing certain things the old way. He explained they very well know it’s the old way but in order to be compliant they must do it.

      • all_blue_chucks 7 years ago

        Where I work Compliance and Security are completely different departments. This is great because the Security department does whatever they think is best for security, regardless of compliance requirements.

        The Compliance department has one job: passing audits. They never tell Security what to do; they document "compensating controls" and if that's not good enough for an Auditor the Compliance department will run whatever worthless compliance control themselves.

        I'm not saying security compliance itself is a joke. It forces small businesses to at least try to get their shit together. But for big tech companies with real security programs, security compliance is a worthless tax.

      • clhodapp 7 years ago

        It's not about old vs new, it's about strong vs weak. WAF was too weak to be your primary line of defense against SQL injection when it was first popularized and it's still too weak now.

      • henvic 7 years ago

        I'm curious by what do you mean 'old way' for the very reason exposed above.

        Would you mind to give some examples?

ris 7 years ago

This is an advertisement.

moutix 7 years ago

That's why we now have RASP. It's better than SQL proxy and WAF, because you have both the SQL query and the HTTP parameters and you can correlate them to be super accurate

  • ninegunpiOP 7 years ago

    Isn't RASP just slapping the WAF-like signature detection into your application data streams directly? How would RASP prevent:

    1. Insiders having access to database front?

    2. Same SQL bypass techniques as employed to bypass WAFs?

    3. Mitigate developer errors in query logic which enable custom injections?

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection