Concept Flow - How SQL injection exploits queries
User Input Received
Input Inserted into SQL Query
Query Sent to Database
Database Executes Query
If Input is Malicious
Yes
SQL Injection Occurs
Attacker Gains Unauthorized Access
END
No
Query Executes Normally
END
User input is added to a SQL query. If input is malicious, it changes query meaning, causing SQL injection and unauthorized access.