TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Preventing SQL Injections When WAF’s Not Enough

18 点作者 ninegunpi超过 6 年前

4 条评论

dullgiulio超过 6 年前
Umh, this article is dubious.<p>1. If your WAF can be fooled by adding a X-Forwarded-For header, trouble ahead.<p>2. If your security strategy is about mitigating attacks where the payload matches some regular expressions, trouble ahead. Machine learning? Double trouble ahead.<p>3. If you don&#x27;t write only completely static queries[1] to then use as prepared statements or use a proper ORM[2] when using a SQL database, trouble ahead.<p>[1] <a href="https:&#x2F;&#x2F;www.akadia.com&#x2F;services&#x2F;dyn_modify_where_clause.html" rel="nofollow">https:&#x2F;&#x2F;www.akadia.com&#x2F;services&#x2F;dyn_modify_where_clause.html</a><p>[2] Like linq, jOOQ...
评论 #19158167 未加载
all_blue_chucks超过 6 年前
WAF&#x27;s are never good enough. They&#x27;re a weak band-aid used by companies who lack the expertise to find and fix security bugs in their own code.
评论 #19155835 未加载
ris超过 6 年前
This is an advertisement.
moutix超过 6 年前
That&#x27;s why we now have RASP. It&#x27;s better than SQL proxy and WAF, because you have both the SQL query and the HTTP parameters and you can correlate them to be super accurate
评论 #19169928 未加载