Insert string into SQL query without quotes









up vote
-4
down vote

favorite












I need to make a query that looks like this:



SELECT * FROM Table WHERE Row.DATA = value


Where DATA I need to pass through SqlParameter. If I do something like this:



string value = "DATA";
SqlCommand sql = new SqlCommand("SELECT * FROM Table WHERE Row.@Val = value");
sql.Parameters.Add("@Val", SqlDbType.VarChar).Value = value;


I get following query which is invalid:



SELECT * FROM Table WHERE Row.'DATA' = value









share|improve this question









New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.















  • 2




    The Parameter is supposed to be your value, not data
    – Hooman
    yesterday






  • 1




    SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
    – Tetsuya Yamamoto
    yesterday










  • Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
    – Tetsuya Yamamoto
    yesterday














up vote
-4
down vote

favorite












I need to make a query that looks like this:



SELECT * FROM Table WHERE Row.DATA = value


Where DATA I need to pass through SqlParameter. If I do something like this:



string value = "DATA";
SqlCommand sql = new SqlCommand("SELECT * FROM Table WHERE Row.@Val = value");
sql.Parameters.Add("@Val", SqlDbType.VarChar).Value = value;


I get following query which is invalid:



SELECT * FROM Table WHERE Row.'DATA' = value









share|improve this question









New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.















  • 2




    The Parameter is supposed to be your value, not data
    – Hooman
    yesterday






  • 1




    SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
    – Tetsuya Yamamoto
    yesterday










  • Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
    – Tetsuya Yamamoto
    yesterday












up vote
-4
down vote

favorite









up vote
-4
down vote

favorite











I need to make a query that looks like this:



SELECT * FROM Table WHERE Row.DATA = value


Where DATA I need to pass through SqlParameter. If I do something like this:



string value = "DATA";
SqlCommand sql = new SqlCommand("SELECT * FROM Table WHERE Row.@Val = value");
sql.Parameters.Add("@Val", SqlDbType.VarChar).Value = value;


I get following query which is invalid:



SELECT * FROM Table WHERE Row.'DATA' = value









share|improve this question









New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











I need to make a query that looks like this:



SELECT * FROM Table WHERE Row.DATA = value


Where DATA I need to pass through SqlParameter. If I do something like this:



string value = "DATA";
SqlCommand sql = new SqlCommand("SELECT * FROM Table WHERE Row.@Val = value");
sql.Parameters.Add("@Val", SqlDbType.VarChar).Value = value;


I get following query which is invalid:



SELECT * FROM Table WHERE Row.'DATA' = value






c#






share|improve this question









New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











share|improve this question









New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this question




share|improve this question








edited yesterday









Bradley Grainger

19.2k36386




19.2k36386






New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked yesterday









Vlad Gavrilov

1




1




New contributor




Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






Vlad Gavrilov is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.







  • 2




    The Parameter is supposed to be your value, not data
    – Hooman
    yesterday






  • 1




    SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
    – Tetsuya Yamamoto
    yesterday










  • Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
    – Tetsuya Yamamoto
    yesterday












  • 2




    The Parameter is supposed to be your value, not data
    – Hooman
    yesterday






  • 1




    SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
    – Tetsuya Yamamoto
    yesterday










  • Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
    – Tetsuya Yamamoto
    yesterday







2




2




The Parameter is supposed to be your value, not data
– Hooman
yesterday




The Parameter is supposed to be your value, not data
– Hooman
yesterday




1




1




SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
– Tetsuya Yamamoto
yesterday




SqlParameters used to provide values, they're not intended to pass table names, schemas or other things than potentially assigned values.
– Tetsuya Yamamoto
yesterday












Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
– Tetsuya Yamamoto
yesterday




Additionally, try PREPARE stmt1 FROM "yourqueryhere" then EXECUTE stmt1 USING @Val to execute the query.
– Tetsuya Yamamoto
yesterday












1 Answer
1






active

oldest

votes

















up vote
1
down vote













string value = "DATA";
SqlCommand sql = new SqlCommand($"SELECT * FROM Table WHERE Row.value = value");





share|improve this answer
















  • 1




    I know that this is one simple solution. But isn't it insecure?
    – Vlad Gavrilov
    yesterday






  • 1




    This will work only if the OP is extremely careful and only uses known strings for value.
    – Panagiotis Kanavos
    yesterday











  • @VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
    – Antoine V
    yesterday











Your Answer






StackExchange.ifUsing("editor", function ()
StackExchange.using("externalEditor", function ()
StackExchange.using("snippets", function ()
StackExchange.snippets.init();
);
);
, "code-snippets");

StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "1"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);






Vlad Gavrilov is a new contributor. Be nice, and check out our Code of Conduct.









 

draft saved


draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53205214%2finsert-string-into-sql-query-without-quotes%23new-answer', 'question_page');

);

Post as a guest






























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes








up vote
1
down vote













string value = "DATA";
SqlCommand sql = new SqlCommand($"SELECT * FROM Table WHERE Row.value = value");





share|improve this answer
















  • 1




    I know that this is one simple solution. But isn't it insecure?
    – Vlad Gavrilov
    yesterday






  • 1




    This will work only if the OP is extremely careful and only uses known strings for value.
    – Panagiotis Kanavos
    yesterday











  • @VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
    – Antoine V
    yesterday















up vote
1
down vote













string value = "DATA";
SqlCommand sql = new SqlCommand($"SELECT * FROM Table WHERE Row.value = value");





share|improve this answer
















  • 1




    I know that this is one simple solution. But isn't it insecure?
    – Vlad Gavrilov
    yesterday






  • 1




    This will work only if the OP is extremely careful and only uses known strings for value.
    – Panagiotis Kanavos
    yesterday











  • @VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
    – Antoine V
    yesterday













up vote
1
down vote










up vote
1
down vote









string value = "DATA";
SqlCommand sql = new SqlCommand($"SELECT * FROM Table WHERE Row.value = value");





share|improve this answer












string value = "DATA";
SqlCommand sql = new SqlCommand($"SELECT * FROM Table WHERE Row.value = value");






share|improve this answer












share|improve this answer



share|improve this answer










answered yesterday









Antoine V

4,7942422




4,7942422







  • 1




    I know that this is one simple solution. But isn't it insecure?
    – Vlad Gavrilov
    yesterday






  • 1




    This will work only if the OP is extremely careful and only uses known strings for value.
    – Panagiotis Kanavos
    yesterday











  • @VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
    – Antoine V
    yesterday













  • 1




    I know that this is one simple solution. But isn't it insecure?
    – Vlad Gavrilov
    yesterday






  • 1




    This will work only if the OP is extremely careful and only uses known strings for value.
    – Panagiotis Kanavos
    yesterday











  • @VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
    – Antoine V
    yesterday








1




1




I know that this is one simple solution. But isn't it insecure?
– Vlad Gavrilov
yesterday




I know that this is one simple solution. But isn't it insecure?
– Vlad Gavrilov
yesterday




1




1




This will work only if the OP is extremely careful and only uses known strings for value.
– Panagiotis Kanavos
yesterday





This will work only if the OP is extremely careful and only uses known strings for value.
– Panagiotis Kanavos
yesterday













@VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
– Antoine V
yesterday





@VladGavrilov I think it's security because injection come from the value (in the right), with a strange value for the column , the query will fail
– Antoine V
yesterday











Vlad Gavrilov is a new contributor. Be nice, and check out our Code of Conduct.









 

draft saved


draft discarded


















Vlad Gavrilov is a new contributor. Be nice, and check out our Code of Conduct.












Vlad Gavrilov is a new contributor. Be nice, and check out our Code of Conduct.











Vlad Gavrilov is a new contributor. Be nice, and check out our Code of Conduct.













 


draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53205214%2finsert-string-into-sql-query-without-quotes%23new-answer', 'question_page');

);

Post as a guest














































































Popular posts from this blog

𛂒𛀶,𛀽𛀑𛂀𛃧𛂓𛀙𛃆𛃑𛃷𛂟𛁡𛀢𛀟𛁤𛂽𛁕𛁪𛂟𛂯,𛁞𛂧𛀴𛁄𛁠𛁼𛂿𛀤 𛂘,𛁺𛂾𛃭𛃭𛃵𛀺,𛂣𛃍𛂖𛃶 𛀸𛃀𛂖𛁶𛁏𛁚 𛂢𛂞 𛁰𛂆𛀔,𛁸𛀽𛁓𛃋𛂇𛃧𛀧𛃣𛂐𛃇,𛂂𛃻𛃲𛁬𛃞𛀧𛃃𛀅 𛂭𛁠𛁡𛃇𛀷𛃓𛁥,𛁙𛁘𛁞𛃸𛁸𛃣𛁜,𛂛,𛃿,𛁯𛂘𛂌𛃛𛁱𛃌𛂈𛂇 𛁊𛃲,𛀕𛃴𛀜 𛀶𛂆𛀶𛃟𛂉𛀣,𛂐𛁞𛁾 𛁷𛂑𛁳𛂯𛀬𛃅,𛃶𛁼

Crossroads (UK TV series)

ữḛḳṊẴ ẋ,Ẩṙ,ỹḛẪẠứụỿṞṦ,Ṉẍừ,ứ Ị,Ḵ,ṏ ṇỪḎḰṰọửḊ ṾḨḮữẑỶṑỗḮṣṉẃ Ữẩụ,ṓ,ḹẕḪḫỞṿḭ ỒṱṨẁṋṜ ḅẈ ṉ ứṀḱṑỒḵ,ḏ,ḊḖỹẊ Ẻḷổ,ṥ ẔḲẪụḣể Ṱ ḭỏựẶ Ồ Ṩ,ẂḿṡḾồ ỗṗṡịṞẤḵṽẃ ṸḒẄẘ,ủẞẵṦṟầṓế