<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: SQL Injection in Search Fields</title>
	<atom:link href="https://www.exploresecurity.com/sql-injection-in-search-fields/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.exploresecurity.com/sql-injection-in-search-fields/</link>
	<description>IT security tools, techniques and commentary</description>
	<lastBuildDate>Sun, 07 Sep 2025 03:12:25 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.6.1</generator>
	<item>
		<title>By: Jerome</title>
		<link>https://www.exploresecurity.com/sql-injection-in-search-fields/#comment-67617</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Tue, 03 Mar 2020 23:02:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=234#comment-67617</guid>
		<description><![CDATA[Sorry, but I wrote this article over 5 years ago so I can&#039;t remember anything more about this particular case. In general, what I&#039;d recommend is first focusing on getting a simple proof-of-concept working using manual injection. This will ensure you understand the nature of the query in which the injection point resides e.g. in the above case I had to cater for nested queries by adding &lt;code&gt;))&lt;/code&gt;. Ideally, only once you&#039;re getting reliable results from manual techniques is it worth throwing an automated tool like &lt;em&gt;sqlmap&lt;/em&gt; at the problem. In this way, if the tool fails, you know either it&#039;s your configuration of the tool or the tool itself. Without proving the case manually, another reason for the tool failing is that there isn&#039;t a vulnerability there at all!]]></description>
		<content:encoded><![CDATA[<p>Sorry, but I wrote this article over 5 years ago so I can&#8217;t remember anything more about this particular case. In general, what I&#8217;d recommend is first focusing on getting a simple proof-of-concept working using manual injection. This will ensure you understand the nature of the query in which the injection point resides e.g. in the above case I had to cater for nested queries by adding <code>))</code>. Ideally, only once you&#8217;re getting reliable results from manual techniques is it worth throwing an automated tool like <em>sqlmap</em> at the problem. In this way, if the tool fails, you know either it&#8217;s your configuration of the tool or the tool itself. Without proving the case manually, another reason for the tool failing is that there isn&#8217;t a vulnerability there at all!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: zonduu</title>
		<link>https://www.exploresecurity.com/sql-injection-in-search-fields/#comment-67607</link>
		<dc:creator>zonduu</dc:creator>
		<pubDate>Mon, 02 Mar 2020 03:09:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=234#comment-67607</guid>
		<description><![CDATA[I have the same exact behavior in one website i am testing, but when trying it with sqmal using “space2comment” i had no luck. Could you please tell me how was the payload used by sqlmap that worked? I want to try a sleep command or anything that really confirms this issue! Please!!!]]></description>
		<content:encoded><![CDATA[<p>I have the same exact behavior in one website i am testing, but when trying it with sqmal using “space2comment” i had no luck. Could you please tell me how was the payload used by sqlmap that worked? I want to try a sleep command or anything that really confirms this issue! Please!!!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jerome</title>
		<link>https://www.exploresecurity.com/sql-injection-in-search-fields/#comment-19292</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Mon, 21 Aug 2017 20:50:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=234#comment-19292</guid>
		<description><![CDATA[Looks to be an unbalanced string - i.e. too many apostrophes]]></description>
		<content:encoded><![CDATA[<p>Looks to be an unbalanced string &#8211; i.e. too many apostrophes</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mr Khan</title>
		<link>https://www.exploresecurity.com/sql-injection-in-search-fields/#comment-19135</link>
		<dc:creator>Mr Khan</dc:creator>
		<pubDate>Sat, 19 Aug 2017 15:16:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=234#comment-19135</guid>
		<description><![CDATA[how can i bypass this database error 

Error Number: 1064

You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near &#039;%&#039; and status=1 order by id desc limit 0,30&#039; at line 1

select * from movies where name like &#039;%&#039;%&#039; and status=1 order by id desc limit 0,30

Filename: controllers/En.php

Line Number: 129]]></description>
		<content:encoded><![CDATA[<p>how can i bypass this database error </p>
<p>Error Number: 1064</p>
<p>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near &#8216;%&#8217; and status=1 order by id desc limit 0,30&#8242; at line 1</p>
<p>select * from movies where name like &#8216;%&#8217;%&#8217; and status=1 order by id desc limit 0,30</p>
<p>Filename: controllers/En.php</p>
<p>Line Number: 129</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jerome</title>
		<link>https://www.exploresecurity.com/sql-injection-in-search-fields/#comment-7691</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Mon, 09 May 2016 21:29:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=234#comment-7691</guid>
		<description><![CDATA[In MySQL (and therefore in MariaDB) the quote character &quot; can be used for string literals just like an apostrophe &#039;. See the reference at &lt;a href=&quot;https://mariadb.com/kb/en/mariadb/string-literals/&quot; rel=&quot;nofollow&quot;&gt;https://mariadb.com/kb/en/mariadb/string-literals/&lt;/a&gt;.]]></description>
		<content:encoded><![CDATA[<p>In MySQL (and therefore in MariaDB) the quote character &#8221; can be used for string literals just like an apostrophe &#8216;. See the reference at <a href="https://mariadb.com/kb/en/mariadb/string-literals/" rel="nofollow">https://mariadb.com/kb/en/mariadb/string-literals/</a>.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Cury</title>
		<link>https://www.exploresecurity.com/sql-injection-in-search-fields/#comment-7671</link>
		<dc:creator>Cury</dc:creator>
		<pubDate>Sat, 07 May 2016 22:12:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=234#comment-7671</guid>
		<description><![CDATA[Could I ask a dumb question? What if u escape the &quot; character with a back slash? 
For example, x&quot; (I&#039;m searching an online foreign dictionary) gives a SQL error:

Searching for: x&quot;Database errorYou have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near &#039;%&quot;&#039; at line 1

Bur when I do it like this: x\&quot; it works. 

Thanks alot]]></description>
		<content:encoded><![CDATA[<p>Could I ask a dumb question? What if u escape the &#8221; character with a back slash?<br />
For example, x&#8221; (I&#8217;m searching an online foreign dictionary) gives a SQL error:</p>
<p>Searching for: x&#8221;Database errorYou have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near &#8216;%&#8221;&#8216; at line 1</p>
<p>Bur when I do it like this: x\&#8221; it works. </p>
<p>Thanks alot</p>
]]></content:encoded>
	</item>
</channel>
</rss>
