Injection: SQL Injection (Oracle-Based)¶
Identifier:
sql_injection_oracle_based
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner |
|---|---|---|
Description¶
SQL injection detected using oracle-based techniques. This method detects SQL injection vulnerabilities by comparing responses between different payloads. An oracle-based approach uses error triggers to identify when SQL queries are being executed, then compares the response of a malicious payload with the original response. If the malicious payload produces the same response as the original (while an error trigger produces a different response), it indicates a potential SQL injection vulnerability. This technique is particularly useful when error messages are suppressed or when blind SQL injection is present.
Configuration¶
Example¶
Example configuration:
---
security_tests:
sql_injection_oracle_based:
assets_allowed:
- REST
- GRAPHQL
- WEBAPP
skip: false
Reference¶
assets_allowed¶
Type : List[AssetType]*
List of assets that this check will cover.
skip¶
Type : boolean
Skip the test if true.