Such capabilities would be achieved by integrating AR System with an
Identity Management solution, and/or by utilizing the "Integrating
BMC(r) Remedy(r) Action Request System(r) with Single Sign-On (SSO)
Authentication Systems and Other Client-Side Login Intercept
Technologies" white paper.

http://www.bmc.com/supportu/documents/57/12/65712/65712.pdf

Thanks,
 
-Dave Easter

-----Original Message-----
From: Action Request System discussion list(ARSList)
[mailto:[EMAIL PROTECTED] On Behalf Of Carey Matthew Black
Sent: Thursday, January 03, 2008 6:23 AM
To: [email protected]
Subject: Re: Remedy and SQL injection attacks

Is there a white paper (pdf / KB article / whatever) to find more
information about this snip from that white paper?

"
AR System supports these safeguards:
  CAPTCHA (Completely Automated Public Turing Test to Tell Computers
and Humans Apart) programs to prevent automated attacks Challenge
questions
  Password authentication delay for unpredictable behavior of failed
passwords
  Timed lock-down mode instead of lockouts
"

-- 
Carey Matthew Black
Remedy Skilled Professional (RSP)
ARS = Action Request System(Remedy)

Love, then teach
Solution = People + Process + Tools
Fast, Accurate, Cheap.... Pick two.


On Jan 2, 2008 3:44 PM, Easter, David <[EMAIL PROTECTED]> wrote:
> The URL for the white paper, btw, is:
>
> http://www.bmc.com/supportu/documents/40/63/84063/84063.pdf
>
> -David J. Easter
> Sr. Product Manager, Service Management Business Unit
> BMC Software, Inc.
>
> The opinions, statements, and/or suggested courses of action expressed
> in this E-mail do not necessarily reflect those of BMC Software, Inc.
> My voluntary participation in this forum is not intended to convey a
> role as a spokesperson, liaison or public relations representative for
> BMC Software, Inc.
>
> -----Original Message-----
> From: Action Request System discussion list(ARSList)
> [mailto:[EMAIL PROTECTED] On Behalf Of Dwayne Martin
> Sent: Wednesday, January 02, 2008 12:48 PM
> To: [email protected]
> Subject: Remedy and SQL injection attacks
>
> Hello Everyone,
>
> Here is an issue I have just become aware of, and am wondering how
> Remedy handles the danger, or if it even is a danger.
>
> It seems that if a web page accepts data input, and uses that data to
> query a database, the user can insert a value like:
>
> "whatever;do something nasty;--".
>
> Then if the web page uses this value to query the database, the
database
> will actually perform the "do something nasty" command, which could be
> anything from dropping a table to giving somebody administrator
> permissions.
>
> (For a neat little cartoon illustrating this danger see:
> http://xkcd.com/327/.)
>
> So my question is, Does this apply to Remedy data input or queries?
> Suppose somebody queries a Remedy form for entries where a particular
> field = "whatever;do something nasty;--".  Or they enter their name as
> "whatever;do something nasty;--"?  Will the database do something
nasty,
> or does Remedy take precautions against it, or is there no danger in
the
> first place?
>
> Dwayne Martin
> James Madison University

________________________________________________________________________
_______
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
Platinum Sponsor: www.rmsportal.com ARSlist: "Where the Answers Are"

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
Platinum Sponsor: www.rmsportal.com ARSlist: "Where the Answers Are"

Reply via email to