Secure by Design Alert: Eliminating SQL Injection Vulnerabilities in Software
Secure by Design Alert: Eliminating SQL Injection Vulnerabilities in Software
https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html.
4 “2023 CWE Top 25 Most Dangerous and Stubborn Software Weaknesses in the CWE Top 25.” MITRE’s CWE Top 25, 2023.
https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html,https://cwe.mitre.org/top25/archive/2023/2023_stubborn_weaknesse
s.html
This document is marked TLP:CLEAR. Recipients may share this information without restriction. Information is subject to standard
copyright rules. For more information on the Traffic Light Protocol, see https://www.cisa.gov/tlp.
TLP:CLEAR
CISA and the FBI recommend software manufacturers research the causes and widely known solutions to this predictable
and commonly exploited vulnerability. Additionally, CISA and the FBI encourage manufacturers to review the following
three principles of the joint guidance, Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by
Design Software.
5 Common Weakness Enumeration (CWE) classification identifies classes of software/hardware weaknesses (including vulnerabilities and
defects); Common Vulnerabilities and Exposures (CVE) classification identifies and labels unique vulnerabilities in specific
software/hardware products.
TLP:CLEAR
cisa.gov [email protected] @CISA.gov @CISACyber @cisa.gov As of March 2024
Secure by Design Alert: Eliminating SQL Injection Vulnerabilities in Software TLP:CLEAR
Leaders should highlight the importance of rooting out entire classes of vulnerabilities rather than addressing them on a
case-by-case basis. Additionally, leaders should establish organizational structures that prioritize proactive measures,
such as adopting secure coding practices like parametrized queries, to create enduring security and reduce reliance on
reactive responses. Senior executives should also ensure their organization conducts reviews to detect common and well-
known vulnerabilities, like SQLi, to determine their susceptibility, and implement the existing effective and documented
mitigations. These reviews should be continually conducted to root out classes of vulnerability, as some vulnerabilities
may change or develop over time.
TLP:CLEAR
cisa.gov [email protected] @CISA.gov @CISACyber @cisa.gov As of March 2024