1. (2)
1. (2)
layer vulnerabilities such as domain name The WHERE clause now contains
server attacks, inline frame flaws, remote two conditions separated by the logical OR
file inclusion, web authentication flaws, operator. The first condition may not be
remote code execution, XSS, and SQL TRUE, but the second condition must be
injection. TRUE because 1 is always equal to 1 and
A survey by the Open Web the logical "OR" operator returns TRUE if
Application Security Project (OWASP) one or both conditions are TRUE.
identified the top 10 vulnerabilities as of Therefore, the hacker gains access without
June 2023: implementation flaws, broken needing to know the password. Sometimes
authentication and session management, incorrect input values can also be provided
sensitive data disclosure, XML external intentionally so that error messages are
entity, broken access control, security detected that help attackers understand the
misconfiguration, XSS, insecurity, database schema. Thus, SQL injection
deserialization, use of components with poses a serious threat to web application
known vulnerabilities, insufficient logging users.
and monitoring. However, among these SQL injection attacks can be divided
forms of attacks, XSS and SQL injection into six categories:
have been identified as the most dangerous a) Logical SQL injection or
[5]. tautology attack:
The WordPress Security Learning Boolean values (True or False) are
Center also claims that if SQL injection used to perform this type of SQL injection.
and XSS vulnerabilities can be handled in A malicious SQL query causes a web
code, then 65% of vulnerabilities will be application to return different results
eliminated. Because web applications use depending on whether the query returns a
data provided by users in SQL queries, TRUE or FALSE result.
hackers can manipulate this data and insert For example, “aaa OR 2 = 2” was
SQL met characters into input fields to inserted into the SQL query “SELECT ∗
access, change, or delete database content. FROM users WHERE password = aaa OR
For example, the WHERE clause in 2 = 2” as a password to change the
a SQL query SELECT*FROM users structure of the WHERE clause of the
WHERE password = 1234 can be original query.
changed when hackers enter data such This produces an SQL query with
as "anything" OR "1" = "1". two different conditions separated by the