sql-inject-reject
v0.1.0
Published
HTTP server middleware for detecting and rejecting SQL injection attempts
Downloads
78
Maintainers
Readme
SQL-Inject-Reject
Detect and reject SQL injection attempts before processing them.
About
Analyzes HTTP a request's URL and body as they're received and if a SQL statement is detected responds with 403 Forbidden. Intended to be part of a layered security approach.
Getting Started
Install sql-inject-reject as an npm module and save it to your package.json file as a dependency:
npm install sql-inject-reject
Once it's installed you can reference it by calling require('sql-inject-reject');
Usage
The middleware allows for configuration of the security level and SQL keywords to reject.
The security levels are paranoid
elevated
typical
and silent
. The security level is set to typical
if no level is specified. Security levels may be specified on load:
app.use(sqlInjectReject({ level: 'elevated' }))
By default any security level typical
or above looks for the OR
SQL keyword.
Additional keywords can be specified with or without specifying a security level. Keywords are validated regardless of their case and their hex equivalents.
Keywords must be specified as an array:
app.use(sqlInjectReject({ keywords: ['UNION','SELECT'] }))
You may pass the middleware to your http server with app.use()
:
const sqlInjectReject = require('sql-inject-reject');
const express = require('express');
const app = express();
app.use(sqlInjectReject());
Or you may pass the middleware to a specific route or routes:
const sqlInjectReject = require('sql-inject-reject');
const express = require('express');
const app = express();
app.post('/login', sqlInjectReject(), function(req, res) {
// some code here
});
Security Levels
By default security levels are hierarchical, which means higher security levels perform the validations of the security levels below them as well as their own. The security level hierarchy is as follows: paranoid
> elevated
> typical
> silent
- Paranoid: Checks for any of
'
--
#
and their hex equivalents. It is likely to produce a lot of false positives. - Elevated: Checks for
=
followed by any'
--
;
and their hex equivalents. - Typical: Checks for
'OR
is any case and its hex equivalents. - Silent: Performs no SQL checks but can still be used with specific keywords.
Notes
This package is not intended to be a substitute for SQL query validation.
License
MIT