Skip to content

Commit

Permalink
Mistake fixed 4-Web_Application_Security_Testing/07-Input_Validation_…
Browse files Browse the repository at this point in the history
…Testing/03.2-Testing_for_MySQL (OWASP#591)
  • Loading branch information
Manindar Mohan committed Jun 30, 2023
1 parent c5277d4 commit b96069f
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ For example the following injection will result in an error:

#### Fingerprinting MySQL

Of course, the first thing to know is if there's MySQL DBMS as a back end database. MySQL server has a feature that is used to let other DBMS ignore a clause in MySQL dialect. When a comment block `'/**/'` contains an exclamation mark `'/*! sql here*/'` it is interpreted by MySQL, and is considered as a normal comment block by other DBMS as explained in [MySQL manual](https://dev.mysql.com/doc/refman/8.0/en/comments.html).
Of course, the first thing to know is if there's MySQL DBMS as a backend database. MySQL server has a feature that is used to let other DBMS ignore a clause in MySQL dialect. When a comment block `'/**/'` contains an exclamation mark `'/*! sql here*/'` it is interpreted by MySQL, and is considered as a normal comment block by other DBMS as explained in [MySQL manual](https://dev.mysql.com/doc/refman/8.0/en/comments.html).

Example:

Expand Down

0 comments on commit b96069f

Please sign in to comment.