Description
Remediation Techniques:
- Make use of combination of parameterized queries, stored procedures, output escaping, and create whitelists for server-side input validation or escape all user supplied inputs as necessary.
- Use database sql command controls like LIMIT / ROWNUM / TOP in case of different database vendors to prevent all data disclosure in case of a successful injection attack.
- Enforce/assign least privileges to the application instance running on server to execute the sql commands against it thus preventing the heavy privilege escalation [Like gaining root access] which will not occur in case of successful injection attack.