Solved

Xml Import security asp.net

Posted on 2014-12-18
5
193 Views
Last Modified: 2014-12-20
I've got an asp.net  program that will create a data set, and then converted to XML, and download it.  I then want to be able to re-import it, and reload the data set to the database.

If I encrypt it, and put a checksum on it, would it be relatively safe from having a sql injection attack built into it between export and import?

If I didn't encrypt it, how might I check it for sql injection attack, considering that it would have unstructured text phrases as part of its content?
0
Comment
Question by:codequest
  • 2
  • 2
5 Comments
 
LVL 12

Accepted Solution

by:
Ammar Gaffar earned 500 total points
ID: 40506847
Hi,
Your question is so generic for me, so defiantly my generic answer is yes, encrypting file is an option, but it might be other solutions based on your business scenario.

I have some questions:
Who is using your asp.net? I mean here anonymous user or authenticated user?
What is your business scenario you need to apply this export and import functionality?
0
 
LVL 79

Expert Comment

by:David Johnson, CD, MVP
ID: 40506921
SQL injection is normally done via http url manipulation and the non checking/validation of user input
0
 
LVL 12

Expert Comment

by:Ammar Gaffar
ID: 40506939
Hi,
Maybe his expression is not the right one "SQL Injuction", but what I understand he is afraid of playing with exported xml file before next import, and this file contains data set structure and data.

codequest, correct me if I am wrong.
0
 
LVL 2

Author Comment

by:codequest
ID: 40506960
Thanks for input.
0
 
LVL 2

Author Closing Comment

by:codequest
ID: 40510790
your questions helped me think it through
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question