> Everything is "paramed" to the hilt - I sanitize all form vars BEFORE
> the query, and then use cfqueryparam on top of that ... so I'm guess
> we're looking at a ftp vulnerability.

What about URL, CGI and Cookie scopes? All of those can cause the same problems.

> Question though - how could an injection attempt on an unprotected query
> add a piece of script to a static page that doesn't even have any
> queries on it?
> I'd kinda like to see what that looked like, if it's possible...

Ask and ye shall receive!

http://www.slideshare.net/inquis/advanced-sql-injection-to-operating-system-full-control-slides

Now, in addition to sanitizing your inputs, there are lots of other
things you can do to limit these vulnerabilities:
- prevent service accounts from writing to the filesystem in the web directory
- limiting the rights of database logins used by your web applications
- limiting the rights of service users generally

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
http://training.figleaf.com/

Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instruction at our training centers, online, or onsite.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:353153
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

Reply via email to