Introduction
Imagine someone sneaking harmful commands into a conversation between your computer and a database. This problem happens when attackers send tricky messages over a network to make a database do things it shouldn't.
Imagine sending a letter to a bank asking for your account balance. If someone sneaks extra instructions into your letter, the bank might accidentally give away your money or personal info. The mail system is like the network carrying your message.
┌───────────────┐ Network ┌───────────────┐
│ User Input │────────────────────▶│ Database Server│
│ (Potentially │ │ (Executes │
│ Malicious) │ │ Queries) │
└───────────────┘ └───────────────┘
▲ │
│ │
└───────────── Malicious SQL Injection ──────────────▶