Actually the attack was pure JS. The source code of the exploit makes for a good read - it demonstrates the things that need to be considered in sanitising user input, which even paranoid people might not consider.
On 10/18/05, Matt Robertson <[EMAIL PROTECTED]> wrote: > Can we Readers-Digest this saga and spill to the masses that these > guys can't spell cfqueryparam? just curious as I'm not inclined to > read this saga unless someone can show me a reason for same. Not so > much a smart opinion as a late nite one... tired and not ready to give > credence to a new threat that sounds like old news. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Logware (www.logware.us): a new and convenient web-based time tracking application. Start tracking and documenting hours spent on a project or with a client with Logware today. Try it for free with a 15 day trial account. http://www.houseoffusion.com/banners/view.cfm?bannerid=67 Message: http://www.houseoffusion.com/lists.cfm/link=i:4:221296 Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4 Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4 Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4 Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

