Insert string into SQL query without quotes

Multi tool use
Multi tool use








up vote
-4
down vote

favorite












I need to make a query that looks like this:



SELECT * FROM Table WHERE Row.DATA = value


Where DATA I need to pass through SqlParameter. If I do something like this:



string value = "DATA";
SqlCommand sql = new SqlCommand("SELECT * FROM Table WHERE Row.@Val = value");
sql.Parameters.Add("@Val", SqlDbType.VarChar).Value = value;


I get following query which is invalid:



SELECT * FROM Table WHERE Row.'DATA' = value









share|improve this question









New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.















  • 2




    The Parameter is supposed to be your value, not data
    – Hooman
    yesterday






  • 1




    SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
    – Tetsuya Yamamoto
    yesterday










  • Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
    – Tetsuya Yamamoto
    yesterday














up vote
-4
down vote

favorite












I need to make a query that looks like this:



SELECT * FROM Table WHERE Row.DATA = value


Where DATA I need to pass through SqlParameter. If I do something like this:



string value = "DATA";
SqlCommand sql = new SqlCommand("SELECT * FROM Table WHERE Row.@Val = value");
sql.Parameters.Add("@Val", SqlDbType.VarChar).Value = value;


I get following query which is invalid:



SELECT * FROM Table WHERE Row.'DATA' = value









share|improve this question









New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.















  • 2




    The Parameter is supposed to be your value, not data
    – Hooman
    yesterday






  • 1




    SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
    – Tetsuya Yamamoto
    yesterday










  • Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
    – Tetsuya Yamamoto
    yesterday












up vote
-4
down vote

favorite









up vote
-4
down vote

favorite











I need to make a query that looks like this:



SELECT * FROM Table WHERE Row.DATA = value


Where DATA I need to pass through SqlParameter. If I do something like this:



string value = "DATA";
SqlCommand sql = new SqlCommand("SELECT * FROM Table WHERE Row.@Val = value");
sql.Parameters.Add("@Val", SqlDbType.VarChar).Value = value;


I get following query which is invalid:



SELECT * FROM Table WHERE Row.'DATA' = value









share|improve this question









New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











I need to make a query that looks like this:



SELECT * FROM Table WHERE Row.DATA = value


Where DATA I need to pass through SqlParameter. If I do something like this:



string value = "DATA";
SqlCommand sql = new SqlCommand("SELECT * FROM Table WHERE Row.@Val = value");
sql.Parameters.Add("@Val", SqlDbType.VarChar).Value = value;


I get following query which is invalid:



SELECT * FROM Table WHERE Row.'DATA' = value






c#






share|improve this question









New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











share|improve this question









New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this question




share|improve this question








edited yesterday









Bradley Grainger

19.2k36386




19.2k36386






New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked yesterday









Vlad Gavrilov

1




1




New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.







  • 2




    The Parameter is supposed to be your value, not data
    – Hooman
    yesterday






  • 1




    SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
    – Tetsuya Yamamoto
    yesterday










  • Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
    – Tetsuya Yamamoto
    yesterday












  • 2




    The Parameter is supposed to be your value, not data
    – Hooman
    yesterday






  • 1




    SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
    – Tetsuya Yamamoto
    yesterday










  • Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
    – Tetsuya Yamamoto
    yesterday







2




2




The Parameter is supposed to be your value, not data
– Hooman
yesterday




The Parameter is supposed to be your value, not data
– Hooman
yesterday




1




1




SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
– Tetsuya Yamamoto
yesterday




SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
– Tetsuya Yamamoto
yesterday












Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
– Tetsuya Yamamoto
yesterday




Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
– Tetsuya Yamamoto
yesterday












1 Answer
1






active

oldest

votes

















up vote
1
down vote













string value = "DATA";
SqlCommand sql = new SqlCommand($"SELECT * FROM Table WHERE Row.value = value");





share|improve this answer
















  • 1




    I know that this is one simple solution. But isn't it insecure?
    – Vlad Gavrilov
    yesterday






  • 1




    This will work only if the OP is extremely careful and only uses known strings for value.
    – Panagiotis Kanavos
    yesterday











  • @VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
    – Antoine V
    yesterday











Your Answer






StackExchange.ifUsing("editor", function ()
StackExchange.using("externalEditor", function ()
StackExchange.using("snippets", function ()
StackExchange.snippets.init();
);
);
, "code-snippets");

StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "1"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);






Vlad Gavrilov is a new contributor. Be nice, and check out our Code of Conduct.









 

draft saved


draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53205214%2finsert-string-into-sql-query-without-quotes%23new-answer', 'question_page');

);

Post as a guest






























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes








up vote
1
down vote













string value = "DATA";
SqlCommand sql = new SqlCommand($"SELECT * FROM Table WHERE Row.value = value");





share|improve this answer
















  • 1




    I know that this is one simple solution. But isn't it insecure?
    – Vlad Gavrilov
    yesterday






  • 1




    This will work only if the OP is extremely careful and only uses known strings for value.
    – Panagiotis Kanavos
    yesterday











  • @VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
    – Antoine V
    yesterday















up vote
1
down vote













string value = "DATA";
SqlCommand sql = new SqlCommand($"SELECT * FROM Table WHERE Row.value = value");





share|improve this answer
















  • 1




    I know that this is one simple solution. But isn't it insecure?
    – Vlad Gavrilov
    yesterday






  • 1




    This will work only if the OP is extremely careful and only uses known strings for value.
    – Panagiotis Kanavos
    yesterday











  • @VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
    – Antoine V
    yesterday













up vote
1
down vote










up vote
1
down vote









string value = "DATA";
SqlCommand sql = new SqlCommand($"SELECT * FROM Table WHERE Row.value = value");





share|improve this answer












string value = "DATA";
SqlCommand sql = new SqlCommand($"SELECT * FROM Table WHERE Row.value = value");






share|improve this answer












share|improve this answer



share|improve this answer










answered yesterday









Antoine V

4,7942422




4,7942422







  • 1




    I know that this is one simple solution. But isn't it insecure?
    – Vlad Gavrilov
    yesterday






  • 1




    This will work only if the OP is extremely careful and only uses known strings for value.
    – Panagiotis Kanavos
    yesterday











  • @VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
    – Antoine V
    yesterday













  • 1




    I know that this is one simple solution. But isn't it insecure?
    – Vlad Gavrilov
    yesterday






  • 1




    This will work only if the OP is extremely careful and only uses known strings for value.
    – Panagiotis Kanavos
    yesterday











  • @VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
    – Antoine V
    yesterday








1




1




I know that this is one simple solution. But isn't it insecure?
– Vlad Gavrilov
yesterday




I know that this is one simple solution. But isn't it insecure?
– Vlad Gavrilov
yesterday




1




1




This will work only if the OP is extremely careful and only uses known strings for value.
– Panagiotis Kanavos
yesterday





This will work only if the OP is extremely careful and only uses known strings for value.
– Panagiotis Kanavos
yesterday













@VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
– Antoine V
yesterday





@VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
– Antoine V
yesterday











Vlad Gavrilov is a new contributor. Be nice, and check out our Code of Conduct.









 

draft saved


draft discarded


















Vlad Gavrilov is a new contributor. Be nice, and check out our Code of Conduct.












Vlad Gavrilov is a new contributor. Be nice, and check out our Code of Conduct.











Vlad Gavrilov is a new contributor. Be nice, and check out our Code of Conduct.













 


draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53205214%2finsert-string-into-sql-query-without-quotes%23new-answer', 'question_page');

);

Post as a guest














































































RonwQ No7cHajqQ luD,Oxjvvl,SZdjb zBpb3,LYFbLa e7,N sp62NC,a QYWQ7PJ2t
hLha979O2BGdXgC,oHyigYIl Wkc zZsrR6mm,87cBxx 1YbP,WTmBRrh HCquH 1G8R2

Popular posts from this blog

Old paper Canadian currency

𛂒𛀶,𛀽𛀑𛂀𛃧𛂓𛀙𛃆𛃑𛃷𛂟𛁡𛀢𛀟𛁤𛂽𛁕𛁪𛂟𛂯,𛁞𛂧𛀴𛁄𛁠𛁼𛂿𛀤 𛂘,𛁺𛂾𛃭𛃭𛃵𛀺,𛂣𛃍𛂖𛃶 𛀸𛃀𛂖𛁶𛁏𛁚 𛂢𛂞 𛁰𛂆𛀔,𛁸𛀽𛁓𛃋𛂇𛃧𛀧𛃣𛂐𛃇,𛂂𛃻𛃲𛁬𛃞𛀧𛃃𛀅 𛂭𛁠𛁡𛃇𛀷𛃓𛁥,𛁙𛁘𛁞𛃸𛁸𛃣𛁜,𛂛,𛃿,𛁯𛂘𛂌𛃛𛁱𛃌𛂈𛂇 𛁊𛃲,𛀕𛃴𛀜 𛀶𛂆𛀶𛃟𛂉𛀣,𛂐𛁞𛁾 𛁷𛂑𛁳𛂯𛀬𛃅,𛃶𛁼

ữḛḳṊẴ ẋ,Ẩṙ,ỹḛẪẠứụỿṞṦ,Ṉẍừ,ứ Ị,Ḵ,ṏ ṇỪḎḰṰọửḊ ṾḨḮữẑỶṑỗḮṣṉẃ Ữẩụ,ṓ,ḹẕḪḫỞṿḭ ỒṱṨẁṋṜ ḅẈ ṉ ứṀḱṑỒḵ,ḏ,ḊḖỹẊ Ẻḷổ,ṥ ẔḲẪụḣể Ṱ ḭỏựẶ Ồ Ṩ,ẂḿṡḾồ ỗṗṡịṞẤḵṽẃ ṸḒẄẘ,ủẞẵṦṟầṓế