Vulnerability Development mailing list archives
Re: malformed sql queries
From: "JayBonci" <jay () manifestresearch com>
Date: Sat, 29 Dec 2001 22:44:40 -0500
Problem is, it's a differnet problem when using ODBC stuff and when doing
say a standard connection to a mysql server. I don't see anything vulnerable
(this by no means that it's not) with a % (or any other mysql regexp),
because you need to explicitly call that regular expression with a LIKE
statement in order for it to do anything.
LIKE "%%h%%" may not do anything. (haven't tried) The quotes in mysql are
the real dangers, IMO, because if you are forming the string raw (BAD!) then
they can start manipulating things with the quotes. The semicolon isn't
necessary as it's not a special character inside of a string.
Please let me know if I'm wrong.
--JB
----- Original Message -----
From: "Peter Gutmann" <pgut001 () cs auckland ac nz>
To: <vuln-dev () securityfocus com>
Sent: Saturday, December 29, 2001 10:19 PM
Subject: Re: malformed sql queries
"JayBonci" <jay () manifestresearch com> writes:Wrap all your functions and do a $id =~ s/\'/\\\'/g; On your stuff.That isn't really enough though. At the moment I automatically escape
''',
'\', '%', and ';', and also '|' under Windows (wonderful option that last
one,
try '|shell("cmd /c echo " & chr(124) & " format c:")|' on an ODBC data
source). Are there any more which need to be caught?
Peter.
Current thread:
- malformed sql queries Gabriel A. Maggiotti (Dec 29)
- Re: malformed sql queries JayBonci (Dec 29)
- Re: malformed sql queries Francois Scala (Dec 30)
- <Possible follow-ups>
- Re: malformed sql queries Peter Gutmann (Dec 29)
- Re: malformed sql queries JayBonci (Dec 29)
- Re: malformed sql queries Peter Gutmann (Dec 29)
- Re: malformed sql queries Blue Boar (Dec 29)
- Re: malformed sql queries Kevin Hegg (Dec 31)
