6.3 Avoid Privilege Escalation |
||||||
Unless carefully designed, routines may effectively grant users more privileges than was intended. Wherever possible, run code with invoker's rights to minimize the scope for privilege escalation attacks and to mitigate the impact of a successful SQL injection attack. Where this is not possible, then routines that run with definer's rights should be carefully reviewed to ensure that the database privilege model is upheld.
|