![](https://lemmy.dbzer0.com/pictrs/image/01f1937c-014d-4201-9996-fe35b14ddca7.webp)
![](https://programming.dev/pictrs/image/170721ad-9010-470f-a4a4-ead95f51f13b.png)
142·
3 hours agoEvery German person I’ve ever met talks so confidently about shit that you just kinda assume they know what they’re talking about, until they start talking about a domain you’re an expert in and you realize they’re actually kinda dumb but with good vocabulary.
No. You can have control over specific parameters of an SQL query though. Look up insecure direct object reference vulnerabilities.
Consider a website that uses the following URL to access the customer account page, by retrieving information from the back-end database:
https://insecure-website.com/customer_account?customer_number=132355
Here, the customer number is used directly as a record index in queries that are performed on the back-end database. If no other controls are in place, an attacker can simply modify the customer_number value, bypassing access controls to view the records of other customers.