In our ancient classic ASP environment, we use OWASP to retrieve the password from the request object and encrypt non-alphanumeric characters. This is the first line of defense to prevent sql injection. We use other methods to prevent a full sql injection.
The problem is that when we collect data to collect the HTTP message message and just grab the password from user input, OWASP and send it. Therefore, the password is incorrect.
Example: Password freddie $ cougar becomes freddie & 36; cougar
What we ended up assuming was that the text field with 50 characters did not have enough space to make a lot of sql injections and changed the code, so we did not enter the OWASP password. This is a little scary.
Is this the best way?
The code is written in vbScript.
source
share