Click here to Skip to main content
13,550,968 members
Click here to Skip to main content
Add your own
alternative version


76 bookmarked
Posted 9 Sep 2007
Licenced CPOL

HTTP Request Query String Protection

, 9 Feb 2008
Rate this:
Please Sign up or sign in to vote.
Add one layer of security to your Web application

Table of Contents

  1. Introduction
  2. The Motivation
  3. TagSinj Intervention
  4. Overview of Functionality
  5. The Actual Code Behind It
  6. Using the Code


This article will present a solid method of securing your query string from SQL injections. The overall idea was inspired from the way payment gateways secure their parameters.

TagSinj (Stands for Tag Secure Injection) class includes two main functions which can integrate easily with all Web applications.

The Motivation...

When building applications, it is very necessary to secure the way you grab parameters sent by the HTTP query string. It is very common and simplistic for users just to alter those parameters and mess up your application. For example, let's say you are using two parameters in your query string, one to identify the page you wish to load, and another to load a specific product using its ID (Database ID, i.e.: Primary Key), your query string might look as follows:

Let's say you are grabbing those parameters and generating a database query. Your database query might look like this:

SELECT * FROM product WHERE ProductID = '234'

A simple manipulation of the query string is as follows (removing the value of the parameter "id"):

Your dynamically generated database query will turn out to be:

SELECT * FROM product WHERE ProductID = '' 

That usually won't do much harm, except that it wouldn't load properly by the user, but what if your environment is not secured enough? For example:';DROP DATABASE databasename;--

Your dynamically generated database query will turn out to be:

SELECT * FROM product WHERE ProductID = '';DROP DATABASE databasename;--'

This can be quite harmful...

TagSinj Intervention

TagSinj intervenes just one layer prior to generating your database query string. Once your page loads, TagSinj will check the sent parameters. If they are authentic, then you can continue executing your code, otherwise, they have been manipulated. You can break execution of the code and handle the exception accordingly.

Overview of Functionality

The main concept behind this idea is mainly to confirm that the parameters that were sent from one page are exactly the same as the parameters received by the recipient page (Works fine, even if both pages are the same page).
To do so, this class will append an additional parameter to the querystring (called "mac") which is an MD5 string (The mac parameter is the MD5 result of all parameters concatenated together with a Secure Access code).

Thus, in order to lock your query string from injections, you would need to generate secure links (generateSecureLink(string link)) and upon loading the page, you need a method to authenticate the parameters (validateLink(HttpRequest Request)).

The Actual Code Behind It...

First, I will discuss the method that generates the secure links. What this method would do is take the original link that you use, for example: default.aspx?par1=hello&par2=world and return default.aspx?par1=hello&par2=world&mac=MD5STRING where MD5STRING is your par1 value concatenated with your par2 value concatenated with your secure access key, i.e. in this case we would have (and if our access code is "howareyou"): helloworldhowareyou.

/// <span class="code-SummaryComment"><summary></span>
/// This method takes a link and appends to it the secure hash used to
/// validate the query string
/// <span class="code-SummaryComment"></summary></span>
/// <span class="code-SummaryComment"><param name="""""link""""" />link</param></span>
/// <span class="code-SummaryComment"><returns>input link with mac paramater appended</returns></span>
        public static string generateSecureLink(string link)
            string toHash = "";
            string[] querystring = null;
            string[] vars = null;
            string[] vals = null;
//if the link has some parameters            
if (link.Contains("?"))
                querystring = link.Split('?'); vars = querystring[1].Split('&');
                foreach (string st in vars)
                    vals = st.Split('=');
                    //toHash has all parameters value appended next to each other
                    toHash += vals[1].ToString();
                querystring = link.Split('?');
                vars = querystring[1].Split('=');
                toHash += vals[1].ToString();
            //append the access code to the end of the string and MD5 the result
            string hashed = TagSinj.Hash(toHash + TagSinj.AccessCode);
            //returns the mac parameter appended to the link
            return link + "&mac=" + hashed;

Secondly, you would need a method that validates the generated secure link (it is to be used whenever you want to validate that your query string is received exactly the same way that it was sent.

This method takes the HttpRequest (uses the querystring from it). It basically retakes all parameters passed by the querystring except for the "mac", re-concatenates them in the same order they were passed and appends the access key.

Then it matches the resulting MD5 string with the grabbed MD5 string. If both match, then the query string is safe, otherwise it has been manipulated and there is a possible threat.

/// <span class="code-SummaryComment"><summary></span>
/// This method takes an HttpRequest as a parameter and checks 
/// whether the query string parameters have been
/// manipulated by the user
/// <span class="code-SummaryComment"></summary></span>
/// <span class="code-SummaryComment"><param name="""""Request""""" /></span>
/// HttpRequest, used to take the querystring item<span class="code-SummaryComment"></param></span>
/// <span class="code-SummaryComment"><returns>true if query string is authentic, false otherwise</returns></span>
public static bool validateLink(HttpRequest Request)
        //loop through all the parameters and recreate the hash
        if (Request.QueryString.Count > 0)
            String[] queryKeys = Request.QueryString.AllKeys;
            int queryCount = Request.QueryString.Count;

            string toHash = "";
            for (int m = 0; m < queryCount; m++)
                if (queryKeys[m] != "mac")
                    toHash += Request.QueryString[queryKeys[m]];
            string hashed = TagSinj.Hash(toHash + TagSinj.AccessCode);
            if (hashed != Request.QueryString["mac"])
                return false;
                return true;
            return false;
        return false;

Using the Code

Below, I will illustrate the way to use this class:

Step 1: Include

  • Download
  • Add the *.dll file as a reference in your project
  • Include the file in your *.cs files:
using System.Web.UI.WebControls; 
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using TagSinj;

Once the above step has been taken care of, you can now use the two methods offered by this class.

Step 2: Setting up the Access Code

To have a unique "mac" you have to set a value to your access code. This can be set once in your global.asax page or in the page where you are using this class. The access code can be any string of your choice.

//The below selected access code is for illustration purposes only
//Simpler or more complex codes can be randomly generated
TagSinj.TagSinj.AccessCode = "AV$%990LK_12";

Step 3: Generating Secure Links

In order for the query string to be accepted by your application, you have to generate secure links using:

//the generateSecureLink function will append to the parameter added a
//"mac" parameter which will be a unique way of identifying your
//sequence of parameters
secureLink = TagSinj.TagSinj.generateSecureLink
Your resulting value should look like: 

Step 4: Grabbing Your Variables

Now that you have your links secured, it is time to make sure that no one is manipulating your query string. To do so, under the Page_Load event, add this piece of code:

if (TagSinj.TagSinj.validateLink(this.Request))
   //parameters are exactly the same way you have sent them
   //Do action
   Response.Write("The parameters are correct");
   //somebody is playing around with the parameters
   //Do action
   Response.Write("The parameters are incorrect");

This way, you have made sure that the parameters that you have sent from one page are exactly the same as the parameters you have received. This functionality will greatly reduce to the point of eliminating the threat of SQL injections to your website.


This is my first article here at The Code Project. Any comments would be appreciated. Drop me an email if you are planning to use this DLL.
Thank you for reading.


This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


About the Author

Riad MS Afyouni
Other Born Interactive
Saudi Arabia Saudi Arabia
Follow me:

You may also be interested in...

Comments and Discussions

QuestionIt's not working in my project Pin
Chauhan Shaili22-Apr-14 3:55
memberChauhan Shaili22-Apr-14 3:55 
QuestionNice work but a little confusion Pin
JeslynElena3-Dec-12 20:11
memberJeslynElena3-Dec-12 20:11 
Jokem-m-m-ye [modified] Pin
a.chumak3-Feb-11 7:05
membera.chumak3-Feb-11 7:05 
Generalinteresting but confusing Pin
Member 45366431-Dec-08 20:25
memberMember 45366431-Dec-08 20:25 
GeneralInteresting, but.. Pin
merlin98111-Feb-08 4:00
membermerlin98111-Feb-08 4:00 
GeneralSeems overly complicated Pin
Sacha Faust10-Feb-08 11:33
memberSacha Faust10-Feb-08 11:33 
GeneralRe: Seems overly complicated Pin
Riad MS Afyouni10-Feb-08 19:27
memberRiad MS Afyouni10-Feb-08 19:27 
GeneralRe: Seems overly complicated Pin
wtwhite11-Feb-08 13:26
memberwtwhite11-Feb-08 13:26 
GeneralRe: Seems overly complicated Pin
Riad MS Afyouni11-Feb-08 19:24
memberRiad MS Afyouni11-Feb-08 19:24 
QuestionA question about injecting Mac Pin
Aliasncnu14-Jan-08 14:59
memberAliasncnu14-Jan-08 14:59 
GeneralRe: A question about injecting Mac Pin
Riad MS Afyouni14-Jan-08 19:22
memberRiad MS Afyouni14-Jan-08 19:22 
GeneralRe: A question about injecting Mac Pin
Aliasncnu14-Jan-08 20:12
memberAliasncnu14-Jan-08 20:12 
GeneralRe: A question about injecting Mac Pin
Riad MS Afyouni14-Jan-08 20:40
memberRiad MS Afyouni14-Jan-08 20:40 
GeneralI was confused by the article title Pin
Urs Enzler8-Jan-08 22:47
memberUrs Enzler8-Jan-08 22:47 
GeneralRe: I was confused by the article title Pin
Riad MS Afyouni8-Jan-08 22:52
memberRiad MS Afyouni8-Jan-08 22:52 
GeneralOne question Pin
Dewey9-Oct-07 15:51
memberDewey9-Oct-07 15:51 
GeneralRe: One question Pin
Riad MS Afyouni9-Oct-07 21:14
memberRiad MS Afyouni9-Oct-07 21:14 
QuestionParameter validation Pin
1ll3xc9-Sep-07 21:40
member1ll3xc9-Sep-07 21:40 
AnswerRe: Parameter validation Pin
Riad MS Afyouni9-Sep-07 23:59
memberRiad MS Afyouni9-Sep-07 23:59 
GeneralRe: Parameter validation Pin
1ll3xc10-Sep-07 0:50
member1ll3xc10-Sep-07 0:50 
GeneralRe: Parameter validation Pin
Aliasncnu14-Jan-08 14:54
memberAliasncnu14-Jan-08 14:54 
GeneralRe: Parameter validation Pin
Riad MS Afyouni14-Jan-08 19:25
memberRiad MS Afyouni14-Jan-08 19:25 
GeneralVery nice Pin
Cam Birch9-Sep-07 16:20
memberCam Birch9-Sep-07 16:20 
GeneralRe: Very nice Pin
Riad MS Afyouni9-Sep-07 23:58
memberRiad MS Afyouni9-Sep-07 23:58 
GeneralRe: Very nice Pin
Cam Birch10-Sep-07 6:58
memberCam Birch10-Sep-07 6:58 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.

Permalink | Advertise | Privacy | Terms of Use | Mobile
Web02-2016 | 2.8.180515.1 | Last Updated 10 Feb 2008
Article Copyright 2007 by Riad MS Afyouni
Everything else Copyright © CodeProject, 1999-2018
Layout: fixed | fluid