News

Who's to Blame for SQL Threat?

SQL injection attacks stir up concerns over weaknesses in databases and coding practices.

Database developers have found themselves in an unwelcome spotlight in recent weeks, thanks to reports that the latest SQL injection exploit may have impacted hundreds of thousands of sites running Internet Information Services (IIS) and SQL Server.

According to various reports, these attacks occur after a hacker injects malicious JavaScript code into the actual database server, which in turn can insert or create one or more malicious scripts that can wreak havoc on the computer of a user visiting the offending Web site. That led the United States Computer Emergency Readiness Team (US-CERT), a division of the Department of Homeland Security, to advise end users to disable JavaScript and ActiveX controls and to practice good patch management.

There are no new vulnerabilities in SQL Server or IIS, wrote Bill Sisk, a communications manager for Microsoft's Security Response Center, in a blog posting. "To protect against SQL injection attacks the developer of the Web site or application must use industry best practices," Sisk wrote.

Blame Game
So is Microsoft passing the buck by blaming developers? Many are pointing out that while SQL injections can be extremely destructive and costly, any database left vulnerable will execute anything it determines is valid SQL-be it SQL Server, Oracle, IBM's DB2 or others.

"To suggest that the database vendor should somehow know and choose which SQL should or should not be executed, outside of security and data quality constraints, is way out of bounds," says Wayne Snyder, president of the user group Professional Association for SQL Server (PASS) in an e-mail. "It would be great if all software could do what we intend, instead of what we say."

Snyder, who's also a managing consultant at Mariner LLC, a Charlotte, N.C.-based consultancy and Microsoft business partner, believes threats like this are universal.

"I can't recall the last time I saw any software which spent any effort at all in denying this kind of attack," he adds. "Lack of money, lack of time, lack of interest, difficulty in deciding what to do-all contribute to the fact that most apps and programmers don't defend against this."

Changing Priorities
Will this latest exploit be the one to lead IT organizations to put more priority-and money-into secure coding practices?

"Unfortunately many discussions and project plans don't even have this as an item on the risk assessment," Snyder notes. "The sad truth is that we, as developers, DBAs and project managers, are left holding the bag on this-because it's our bag!"

About the Author

Jeffrey Schwartz is editor of Redmond magazine and also covers cloud computing for Virtualization Review's Cloud Report. In addition, he writes the Channeling the Cloud column for Redmond Channel Partner. Follow him on Twitter @JeffreySchwartz.

comments powered by Disqus

Featured

  • Creating Reactive Applications in .NET

    In modern applications, data is being retrieved in asynchronous, real-time streams, as traditional pull requests where the clients asks for data from the server are becoming a thing of the past.

  • AI for GitHub Collaboration? Maybe Not So Much

    No doubt GitHub Copilot has been a boon for developers, but AI might not be the best tool for collaboration, according to developers weighing in on a recent social media post from the GitHub team.

  • Visual Studio 2022 Getting VS Code 'Command Palette' Equivalent

    As any Visual Studio Code user knows, the editor's command palette is a powerful tool for getting things done quickly, without having to navigate through menus and dialogs. Now, we learn how an equivalent is coming for Microsoft's flagship Visual Studio IDE, invoked by the same familiar Ctrl+Shift+P keyboard shortcut.

  • .NET 9 Preview 3: 'I've Been Waiting 9 Years for This API!'

    Microsoft's third preview of .NET 9 sees a lot of minor tweaks and fixes with no earth-shaking new functionality, but little things can be important to individual developers.

  • Data Anomaly Detection Using a Neural Autoencoder with C#

    Dr. James McCaffrey of Microsoft Research tackles the process of examining a set of source data to find data items that are different in some way from the majority of the source items.

Subscribe on YouTube