"One coder added at least two database entries that are visible on the live site and say “this is a joke of a .gov site” and “THESE ‘EXPERTS’ LEFT THEIR DATABASE OPEN -roro.” "

    • Yoddel_Hickory@lemmy.ca
      link
      fedilink
      English
      arrow-up
      69
      ·
      9 days ago

      If SQL injection is picking a lock, this is entering through an unlocked door.

      Not sophisticated at all, authentication on API routes is way earlier on the security checklist than SQL query sanitisation. This site is amateur work.

    • Fiestorra@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      31
      ·
      9 days ago

      Much much simpler, with a SQL injection at least you have to bypass the filters set, this is just submitting the changes through an API and the DB just eats it up.

      • otp@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        27
        ·
        9 days ago

        SQL injection is like picking a lock.

        This is like trying to open the door and finding out there’s no lock.

        The door isn’t necessarily obviously visible, but most buildings do tend to have doors.

        Borrowed and expanded upon another commenter’s metaphor