My company has a requirement that all production sites pass an AppScan security audit. Sometimes, when we scan a SharePoint installation, the software detects a hidden SQL injection vulnerability. I am sure this is a false result. AppScan probably interprets some other actions in the HTTP response as the success of a blind injection. But it is difficult to prove that this is so.
I suspect that SharePoint, both MOSS 07 and WSS 3.0, uses stored procedures exclusively behind the scenes. Does anyone know if there is any documentation from Microsoft on this subject, and in addition, does any of the stored procedures use dynamically generated SQL? If everyone were sprocs, and none of them were dynamic, we would have pretty good evidence that SharePoint does not have a SQL injection vulnerability.
api sql-injection architecture sharepoint
xmt11
source share