HostMonster Web Hosting Help

SQL Injection - Database Vulnerability

What is it?

SQL injection is an extremely damaging attack in which hackers will attempt to access information stored in your database, such as customer data or user IDs and passwords. SQL stands for Structured Query Language and is the programming language understood by databases. By inserting commands from this programming language into fields on your website's input forms, hackers can gain access to the database records of vulnerable sites, stealing credit card data, passwords, e-mail addresses and any additional data available in the database.

What is the impact?

The impacts of this type of attack can be devastating. Having stolen client information from a compromised website can be hard to recover from and possibly expensive depending on the information stolen. It will also badly damage your company's reputation by exposing your customers' private data to criminals.

How does SiteLock protect me?

SiteLock's patent-pending 360-degree scan technology tests each input box on your website to ensure that they are not vulnerable to this type of attack. We verify the safety of each input box on your website by inserting code in the way hackers would. We do not read or collect any data, however. We use safe test procedures and code and if we discover a vulnerability in our testing, we report it to you immediately. Our Expert Services team can also help you remove these issues from your site.

What can I do about it?

Make sure any applications you use are kept up-to-date and limit the use of third-party plug-ins where possible as they can be a source of many issues and may be updated less frequently or created by unscrupulous publishers. Use a website scanning service that includes SQL injection scans, such as SiteLock. If you are writing your own code, be sure to validate your input fields for special characters and ensure you are checking for this type of hacking in your database procedures called from the website.

Knowledgebase Article 8,110 views bookmark tags: sitelock (updated 27 days ago)


Was this resource helpful?

Did this resolve your issue?


Please add any other comments or suggestions about this content:





Recommended Help Content

This article will explain what to do when SiteLock finds a vulnerability. (updated 368 days ago)
Knowledgebase Article 6,405 views tags: sitelock

This article will explain the benefits of SiteLock for small businesses. (updated 855 days ago)
Knowledgebase Article 15,087 views tags: sitelock

This article will explain the benefits of SiteLock in regards to application scanning. (updated 854 days ago)
Knowledgebase Article 6,456 views tags: sitelock

Related Help Content

This article will explain the benefits of SiteLock in regards to virus scanning. (updated 28 days ago)
Knowledgebase Article 2,278 views tags: sitelock

This article will explain the benefits of SiteLock in regards to reputation monitoring. (updated 855 days ago)
Knowledgebase Article 2,416 views tags: sitelock

This article will explain the benefits of SiteLock in regards to network security vulnerabilities. (updated 854 days ago)
Knowledgebase Article 2,202 views tags: sitelock

This article will explain how and when to contact SiteLock for support. (updated 717 days ago)
Knowledgebase Article 14,610 views tags: security sitelock

This article will explain how to get special pricing on SiteLock. (updated 182 days ago)
Knowledgebase Article 13,149 views tags: sitelock

This article will explain the benefits of SiteLock in regards to cross-site scripting (XSS). (updated 854 days ago)
Knowledgebase Article 12,443 views tags: sitelock

This article will explain how to install the SiteLock Trust Seal. (updated 854 days ago)
Knowledgebase Article 44,368 views tags: sitelock

This article will explain how to order SiteLock (updated 183 days ago)
Knowledgebase Article 12,544 views tags: security sitelock