• BombOmOm@lemmy.world
    link
    fedilink
    English
    arrow-up
    84
    arrow-down
    1
    ·
    6 months ago

    Assuming the accounting system this thing links with both does not protect from SQL injection attacks (many don’t, despite it being easy to protect against) and also has a table named “Bills” with a field named “amount”; what this would do is go through every single Bills record and half the value in the amount field. This would completely fuck the system, particularly when it came to billing and tax filing as the numbers for accounts billing and receivable wouldn’t even come close to matching each other. The accounting department would have a hell of a time fixing the damage.

    • dan@upvote.au
      link
      fedilink
      arrow-up
      12
      arrow-down
      8
      ·
      edit-2
      6 months ago

      does not protect from SQL injection attacks (many don’t, despite it being easy to protect against)

      Every modern database library automatically protects against SQL injection, usually by using prepared statements (where the query with placeholders, and the placeholder values, are sent as two separate things). so a system would have to be written extremely poorly to be vulnerable to it.

      This post is just a joke as developers should hopefully be aware of the OWASP top 10 security vulnerabilities.

      Edit: Bad developers will do bad things, but any reasonable developer should be well aware of these risks.