December 2010
Intermediate to advanced
451 pages
11h 16m
English
To provide the best security for your application, you want to ensure that your dynamic SQL statements are unable to be altered as a result of data entered from an application form.
Take care to provide security against SQL injection attacks by validating user input prior and using it in your dynamic SQL statements or queries. The easiest way to ensure that there are no malicious injections into your SQL is to make use of bind variables.
The following code is an example of a PL/SQL procedure that is vulnerable to SQL injection because it concatenates a variable that is populated with user input and does not properly validate the input prior:
CREATE OR REPLACE PROCEDURE check_password(username ...Read now
Unlock full access