> Anyway, whatever solves the Michael's problem I feel sure
> is going to be a combination of things, not just the one.

Actually, with this particular SQL injection attack it's really easy to
stop.  We created a SQL filter that is called from application.cfm.  It
loops through the URL structure and checks to see if any URL variables
contain both a semi-colon and any SQL keyword.  If a match is found, it just
cfaborts the request and sends us an e-mail with the details.  We
periodically review those messages and have not found a single
false-positive yet after deployment to every site we manage.  Granted, it
will not stop SQL injection through form posts, but I don't recall ever
seeing a SQL injection attack through a form post (yet).  At the least it
can put an immediate stop to the current flood and give you time to
implement other protective measures such as cfqueryparam, etc.  We have CF5
and CFMX versions if anyone wants a copy.


-Justin Scott


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Adobe® ColdFusion® 8 software 8 is the most important and dramatic release to 
date
Get the Free Trial
http://ad.doubleclick.net/clk;203748912;27390454;j

Archive: 
http://www.houseoffusion.com/groups/CF-Talk/message.cfm/messageid:310350
Subscription: http://www.houseoffusion.com/groups/CF-Talk/subscribe.cfm
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4

Reply via email to