Ensure that no second order or quoted vulnerabilities
remain. Typically, this may be caused
if the routine uses string concatenation
with embedded single quotation marks, for example, 'string'''||dbms_assert.routine()||'''';
or similar constructions.
Make sure that user
input such as "sql’injection" does not lead to an injection.
What happens if
an attacker creates valid database objects
with embedded quotes? For example:
"Table'Name"
Identify sources of “trusted” information and
ensure that if the source is taken on trust, all the routines that are able to write to it uphold that
trust.
|