Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Thousands of Web Sites Hit With New Twist on Old SQL Injection Hack
newenterprise.allthingsd.com ^ | Posted on April 1, 2011 at 1:10 PM PT | by Arik Hesseldahl

Posted on 04/01/2011 1:52:38 PM PDT by Red Badger

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-32 last
To: proxy_user

What’s old fashioned about validating input?


21 posted on 04/01/2011 4:41:28 PM PDT by perfect_rovian_storm (The worst is behind us. Unfortunately it is really well endowed.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: proxy_user

Well said. SQL injection is not difficult if you leave the doors wide open in poorly written code. A simple check is if you are expecting a value of no more than 3 chrs in length, truncate the variable to the length. You can also strip many SQL chrs before sending a value and then reject any request string that contains them.


22 posted on 04/01/2011 7:27:28 PM PDT by BornToBeAmerican (Kindness will conquer evil)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ProtectOurFreedom
Yesterday, I visited a new site and experienced this.

What browser were you using?

23 posted on 04/01/2011 8:27:25 PM PDT by zeugma (The only thing in the social security trust fund is your children and grandchildren's sweat.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: zeugma

FF


24 posted on 04/01/2011 11:02:45 PM PDT by ProtectOurFreedom
[ Post Reply | Private Reply | To 23 | View Replies]

To: BornToBeAmerican; perfect_rovian_storm

The method of hand-coding a check for each input field certainly works, but it is tedious, prone to error, and adds costs to the project. If there is time and money pressure, it probably won’t be implemented carefully or at all.

That is why it is much better to use a framework or technology where this is automatically supplied.


25 posted on 04/02/2011 4:29:53 AM PDT by proxy_user
[ Post Reply | Private Reply | To 22 | View Replies]

To: proxy_user

I’m not disagreeing with you, but hand-coding is NOT tedious, prone to error, and adds costs to the project.

It is very simple to write a (reusable) sub-routine or function that does this on the fly.


26 posted on 04/04/2011 7:13:49 PM PDT by BornToBeAmerican (Kindness will conquer evil)
[ Post Reply | Private Reply | To 25 | View Replies]

To: proxy_user

oh, I was referring to every returned post after the form has been submitted. Granted, coders should not allow certain values (chr’s) to be entered in a txt field, but this is not where SQL Injection comes from. Typically an injected field can be passed in the url string.

However; it is not to difficult to create a dummy site and send data to the real site. Of course this is easy to check if the data is coming from the host or not. Still this can be worked around using the header string.

Which brings me back to my first point and that is to check, validate and truncate every string that is returned to the host, no matter where from.

The coder should verify everything is legit before the submit button is pressed, but only the ignorant would assume it will always arrive ‘as sent’

This is probably more info than you wanted.


27 posted on 04/04/2011 7:25:09 PM PDT by BornToBeAmerican (Kindness will conquer evil)
[ Post Reply | Private Reply | To 25 | View Replies]

To: Red Badger; onyx; Jim Robinson; John Robinson

This just happened again to me. I am fairly certain the virus was linked to Sarah Palin pictures from Rolling Thunder. I wasn’t sure the first time, but the second time, the virus made itself apparent right away. I opened a picture of Sarah from a posting from “Crim”. The posting was about pictures of her on the RT tour commenting about a caption that I didn’t see.

Again, I am not 100%, but it seems apparent.

Good luck, and thanks for all you do. Our appreciation can never be overstated.

Brian


28 posted on 06/01/2011 6:23:41 PM PDT by onona (Yes, my state does suck ! No wait, the POLITICIANS and LIBERALS in my state suck)
[ Post Reply | Private Reply | To 1 | View Replies]

To: onona

Thanks very much for telling me, onona.

I only post photos directly from SARAHPAC or other authorized sources. Once those photos are hosted by outside sources, there’s no telling what has happened to them.

I’m so sorry for the trouble you’ve incurred. I’d be crying.


29 posted on 06/01/2011 6:34:03 PM PDT by onyx (If you truly support Sarah Palin and want to be on her busy ping list, let me know!)
[ Post Reply | Private Reply | To 28 | View Replies]

To: onyx

I consider myself fortunate, as I was on a laptop from work. They were able to fix both viruses quick and easy.

Yeah, if it was my own PC, crying, swearing, and the like.

One of the lucky ones this time.


30 posted on 06/01/2011 6:47:43 PM PDT by onona (Yes, my state does suck ! No wait, the POLITICIANS and LIBERALS in my state suck)
[ Post Reply | Private Reply | To 29 | View Replies]

To: proxy_user
But if I can view your HTML, I can do a POST with any data I want.

And how many basic generic principles of Computer Science do you have to violate to allow "data" to be "executable".

31 posted on 06/01/2011 6:57:09 PM PDT by meadsjn (Sarah 2012, or sooner)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Red Badger

32 posted on 06/01/2011 6:58:24 PM PDT by cynwoody
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-32 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson