WebGoat/src/main/resources/lessons/sqlinjection/documentation/SqlInjection_introduction_content9.adoc
Àngel Ollé Blázquez b93c935d6c Renamed to sqlinjection
2022-07-31 22:39:21 +02:00

18 lines
1.1 KiB
Plaintext

== Compromising Integrity with Query chaining
After compromising the confidentiality of data in the previous lesson, this time we are gonna compromise the *integrity*
of data by using SQL *query chaining*.
If a severe enough vulnerability exists, SQL injection may be used to compromise the integrity of any data in the database. Successful SQL injection may allow an attacker to change information that he should not even be
able to access.
=== What is SQL query chaining?
Query chaining is exactly what it sounds like. With query chaining, you try to append one or more queries to the end of
the actual query. You can do this by using the *;* metacharacter. A *;* marks the end of a SQL statement; it allows one to start another query right after the initial query without the need to even start a new line.
=== It is your turn!
You just found out that Tobi and Bob both seem to earn more money than you!
Of course you cannot leave it at that. +
Better go and _change your own salary so you are earning the most!_
Remember: Your name is John *Smith* and your current TAN is *3SL99A*.