ConcatSQL(concatsql
) is a secure SQL database library.
You can use string concatenation to prevent SQL injection.
Supported databases: - PostgreSQL - MySQL - SQLite
You can configure the database backend in Cargo.toml
:
toml
[dependencies]
concatsql = { version = "<version>", features = ["<postgres|mysql|sqlite>"] }
```rust let id = String::from("42"); // User supplied input let passwd = String::from("pass"); // User supplied input
let sql = prep!("SELECT name FROM users WHERE id=") + &id + prep!(" AND passwd=") + &passwd; assert_eq!(sql.simulate(), "SELECT name FROM users WHERE id='42' AND passwd='pass'");
for row in conn.rows(&sql).unwrap() { asserteq!(row.get(0).unwrap(), "Alice"); asserteq!(row.get("name").unwrap(), "Alice"); } ```
```rust let id = String::from("42"); // User supplied input let passwd = String::from("'' or 1=1; --"); // User supplied input
let sql = prep!("SELECT name FROM users WHERE id=") + &id + prep!(" AND passwd=") + &passwd; assert_eq!(sql.simulate(), "SELECT name FROM users WHERE id='42' AND passwd=''''' or 1=1; --'");
for row in conn.rows(&sql).unwrap() { unreachable!(); } ```
prep
macroCannot compile ... secure!
rust
let id = String::from("42");
let passwd = String::from("' or 1=1; --");
let sql = "SELECT name FROM users WHERE id=".to_string() + &id + " AND passwd='" + &passwd + "';";
conn.execute(&sql).unwrap(); // error
prep!(<String>)
Cannot compile ... secure!
rust
let age = String::from("50 or 1=1; --");
let sql = prep!("SELECT name FROM users WHERE age < ") + prep!(&age); // error
This is because it is achieved using Operator Overloading rather than simple string concatenation.
The prep
macro returns the library's own type(WrapString
).
For example, if you combine this WrapString
type with a String
type, the escaped String
type will be combined and a new WrapString
will be returned.
rust
let foobar: WrapString = prep!("foo") + String::from("bar");
It seems that it can be implemented in other languages as long as it supports operator overloading.
However, if the developer writes the following, the input from the attacker will not be escaped correctly and the attack will be successful.
python
prep("SELECT * FROM users WHERE id=" + id + " AND PASSWORD=" + password)
That is, it can be implemented in any language that can distinguish between hard-coding(&'static str
) and user input(String
) at compile time.
MIT