BugTraq
RE: Paper: SQL Injection Attacks by Example Jan 05 2005 08:11PM
Scovetta, Michael V (Michael Scovetta ca com) (3 replies)
Re: Paper: SQL Injection Attacks by Example Jan 05 2005 09:37PM
Chip Andrews (chip sqlsecurity com)
RE: Paper: SQL Injection Attacks by Example Jan 05 2005 09:09PM
David Litchfield (davidl ngssoftware com)
Re: Paper: SQL Injection Attacks by Example Jan 05 2005 08:56PM
Cory Foy (Cory Foy mobilehwy com)
Scovetta, Michael V wrote:
> At least in MSSQL, you'd have to do something bad like use sp_executesql
> or some other function that will re-form a complete sql query and pass
> that to the interpreter. As long as you do more sensible stuff like:
>
> insert into table (name, age) values (@b, @a)
>
> you should be fine.

Except that I've seen webbie-type people who will execute a stored proc
by doing:

strSQL = "exec userLogin " + userName + " " + userPassword

which would be still be subject to a SQL Injection attack if I simply
had a semicolon in the userPassword and then was able to pass any other
query to it.

Cory

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus