IBN AL- HAITHAM J. FOR PURE & APPL. S CI. VOL.24 (2) 2011 Proposed Methods To Prevent SQL Injection A. H. Mohmme d Departme nt of Computer Science, College of Education, Unive rsity of Al- Mustansiriyah Received in : 3, October , 2010 Accepte d in : 8, February, 2011 Abstract In the last decade, the web has rapidly become an attractive p latform, and an indisp ensable p art of our lives. Unfort unately , as our dependency on the web increases so p rogrammers focus more on functionality and appearance than security, has resulted in the interest of att ackers in exp loiting serious security p roblems that target web applications and web-based information sy stems e.g. through an SQL injection att ack. SQL injection in simple terms, is the p rocess of p assing SQL code into interactive web applications that emp loy database services such app lications accep t user inp ut such as form and then include this input in database request s, typ ically SQL st atements in a way that was not intended or anticipated by the application developer that att empts to subvert the relationship between a webpage and its supp orting database, in order to t rick the database into executin g malicious code due to the poor design of the ap p lication. The p rop osed syst em is based on p rotection website at run time, before inclusion of user input with database by validating, encoding, filterin g the content, escap ing sin gle quotes, limiting the input character length, and filtering the excep tion messages. The p rop osed solution is effectiveness and scalability in addition it is easily adopted by application p rogrammers. For emp irical analy sis, we p rovide a case study of our solution and imp lement in Html, PHP, My Sql , Ap ache Server and Jmeter app lication. Key words:web site security , Data Base Server, SQL Injestion attack Introduction The Internet has brought about many chan ges in the way or ganizations and individuals conduct business, and it would be difficult t o op erate effectively without the added efficiency and communications brou ght about by the internet [1]. In the last few y ears, the pop ularity of web-based applications has grown tremendously. A number of factors have led an increasin g number of organizations and individuals to rely on web-based applications to p rovide access to a variety of services. Today, web-based applications are routinely used in security critical environments, such as medical, financial, and military sy stems [2]. Because of the pop ularity of these types of applications many techniques to exp loit their security vulnerabilities are p otentially quite dangerous. One such technique is called SQL injection [3]. SQL Injection att ack has been one of the major threats to the security of web app lications and att ackers can trick server into executing malicious SQL code which is [4]. occurs when user input is p arsed as SQL tokens, thus changing the semantics of the underly ing query [3]. SQL injection att acks have been used to extract customer and order information fro m e- commerce databases or byp ass security mechanisms. The intuition b ehind such att acks is that p redefined logical exp ressions within a p redefined query can be altered simply by injecting op erations that alway s result in true or false st atements [5]. IBN AL- HAITHAM J. FOR PURE & APPL. S CI. VOL.24 (2) 2011 This p aper, p resents a runtime technique to p revent SQL injection observe that all SQL injections alter the st ructure of the query intended by the p rogrammer and by cap turing this st ructure at runtime, we can compare it to the p arsed st ructure after inserting user-sup p lied input, and evaluate similar ity . Evaluated the prop osed sy stem based on user inp ut on a set of real-world app lications without requiring a call to the database, thus lowerin g runtime costs and satisfy the following three criteria: 1. p revent the possibility of the attack 2. M inimize the effort required by the programmer 3. M inimize the runtime overhead. This p aper is st ructured as follows: The next section reviews related work and section 3 describe web server technolo gy and section 4 SQL injection workin g while section 5 describ e p rop osed app roach that characterizes the sanitization p rocess by modeling the way in which an app lication p rocesses input values and p rovides details about the imp lementation of system, section 6 p resents t he exp erimental results that show app roach is feasible in p ractice, section 7 concludes t he paper. -We b Serve r Technology Web based sy stems are a comp osition of infrastructure comp onents, web servers , databases, and of application sp ecific code, such as HTM L-embedded scripts and server-side CGI p rograms[2]. Nowaday s, lots of websites are interactive, dy namic and database-driv en, which run various web app lications in servers with data stored in back- end database. Web 2.0 technologies allow users to do more than just retrieve information. They can access and modify the content and d istribute their information in websites such as social networking sites, wikis and blogs. In other words, they can control the d atabase information via a web browser [6]. Web app lications accep t user inp ut via forms in web p ages. This input is p osted to the server as name value p airs, both of which are st rings. An alternate mechanism to p ass information to the server is the query st ring. The query string is information appended to the end of the URL. On most web servers, a question mark sep arates the resource from the qu ery st ring variables. Each name value p air in the query string is sep arated by an amp ersand, and the user is free to edit this input as easily as form inp uts. Because it is common for web servers can differentiate between variables p assed in the query st ring and those p ost ed in the form, then will consider both as user input [3].Web-based applications represent a serious security exp osure. These app lications are directly accessible through r ewalls by design, in addition[7]. The infrast ructure comp onents are usually developed by exp erienced p rogrammers with solid secur ity skills, t he ap p lication sp ecific code is oft en developed under st rict time const raints by p rogrammers with little security training as a result vulnerab le web- based app lications are deployed and mad e available to the whole internet, creating easi ly exp loitable entry p oints for t he compromise of entire networks [2]. The Internet has brought about p roblems as the result of intruder attacks, both manual and automated, which can cost many organizations excessive amounts of money in damages and lost efficiency [1]. Web-based att acks aimed at either obtaining control of the host running the web server application (e.g., through a buffer overflow ) The first type of attack is caused by vulnerabilities in the web server soft ware or in a server-sid e web-based app lication that allow one to comp romise the security of the underly ing host ,The second type of attack is [7] offer the vulnerabilities of unauthorized database control and malicious code injection which att ackers can take advantage of att ackers are try ing to get valuable information held in database, this hack is a kind of ap p lication attack called SQL injection[6]. -SQL Injection Work ing It is very hard to understand the conceptual idea of SQL injection without p artially understanding the code that runs in the background [8]. A database comp uter language design ed for the retrieval and management of data in relational database management systems (RDBM S) [6]. IBN AL- HAITHAM J. FOR PURE & APPL. S CI. VOL.24 (2) 2011 Structured Query Lan guage (SQL) is used for many database sy st ems including M icrosoft SQL Server, Oracle, My SQL and even M icrosoft Access[8]. SQL injection is y et common vulnerability that is the result of lax input validation. Unlike cross-site scripting vulnerabilities that are ultimately directed at site’s visitors, SQL injection is an att ack on the site itself in p articular its database [9]. In 2008, there was a significant incr ease in the number of websites affected by SQL injection att acks.T his increase can be attributed in part t o the develop ment of automated tools that allowed att ackers to test and comp romise sites much faster than older manual methods.T here are sp ecific examples of SQL injection events that occurred in april 2008 att acks against microsoft internet information services (II S) that affected more than half a million websites and in decemb er 2008 microsoft internet e xp lorer 7 (IE7) that was leveraged via SQL injection att acks [10]. SQL injection att acks are a prime examp le of malicious input that changes the behavior of a p rogram by introduction of query structure into t he input strings. An application that does not p erform input validation (or emp loys error-p rone validation) is vulnerable to SQL injection att acks. Although useful as a first lay er of defense, input validation often is hard to get right, The absence of p rop er input validation has been cited as the number on e cause of vulnerabilities in web app lications [11]. A successful SQL injection exp loit can read confidential data from the database ,modify database data (INSERT/UPDATE/DELETE), execute administration op erations on the database such as shut down of database management sy stem (DBM S) , recover the content of a given file p resent on the DBM S file system and in some cases issue commands t o the operating sy st em, It may also lead to many p otential att acks in other forms[6]. -Proposed System A web application is vulnerable to an SQL injection att ack if an att acker is able to insert SQL st atements into an existing SQL query of the app lication. This is usually achieved by injecting malicious input into user fields that are used to comp ose the query, login p age p romp ts the user to enter her username and p assword into a form typ ically used for checking the user login cred entials therefore, are p rime targets for an att acker. In this example, if the login app lication does not p erform correct input validation of the for m fields, t he att acker can inject st rings into t he query that alter its semantics. For examp le, consider an hack er entering “OR 1=1”-- one of sql injection st ring as in the tabel(1), the “--” command indicates a comment in Transact-SQL. Hence, everything after the first “--” is ignored by the SQL database engine with the help of the first quote in the inp ut string, the user name st ring is closed, while the “OR 1=1” adds a clause to the query which evaluates to true for every row in the table. Wh en executin g this query, the database returns all user rows, which app lications often interpret as a valid login. So in the p rop osed system all client-supp lied data needs to b e cleansed of any characters or st rings that could p ossibly be used maliciously as shown in the figur e(1). In this section list p rop osed methods can be app lied to minimize the risk of a SQL injection att ack . 1. Validation Input The first st ep in any form processing script should check the sy ntax of input for validity to verify that t he inp ut is a valid input in the lan guage. The validation could b e any thing such as checkin g whether the entered valu e for “p assword" is a number, and is 16 or ov er, or mak ing sure the username column has only valid characters such as A to Z, a to z and many classes of input have fixed lan guages such Email addresses, dates etc . 2. Enco ding Input Sometimes input might contain some illegal characters, or it might not alway s be viable to validate all user input for examp le, in a search field the user could ty p e anything that t hey are searching for, including scr ipt tags such as