If you're interested in more detailed information, you might want to
check out the following KB article - which goes in to a pretty fair bit
of detail - specifically related to Oracle

http://www.allaire.com/handlers/index.cfm?ID=17324&Method=Full

John

-----Original Message-----
From: Paris Lundis [mailto:[EMAIL PROTECTED]] 
Sent: Monday, August 13, 2001 11:05 PM
To: CF-Talk
Subject: Re: Hacking CF Web Sites and Applications


Interested in hearing more about the cfqueryparam tag... 4.5 version 
addition I suspect?  

Syntax and use in Mastering ColdFusion 4.5 book leave a lot to be 
desired...

Anyone using it and what for...???


-paris
[finding the future in the past, passing the future in the present]
[connecting people, places and things]


-----Original Message-----
From: Jochem van Dieten <[EMAIL PROTECTED]>
Date: Mon, 13 Aug 2001 22:29:13 +0200
Subject: Re: Hacking CF Web Sites and Applications

> Josh R wrote:
> > This may be simple minded, but you don't need to know every word
> they use. A
> > filter that elaborate would make a site practically useless.
> However, most
> > (actually all) hacks must contain a specific syntax to initiate the
> security
> > hole. For example, the URL attacks on you followed a
> > "...90;%20DROP%20TABLE%20IMAGES..." syntax. My script just looks
> for a
> > hardly-used-always-the-same portion of that needed syntax such as
> > ";%20DROP%20TABLE%20" to trigger the lockout.
> > 
> > I've had some pretty good responses to my little script. It doesn't
> cover
> > every known hack, but then what does? It's better then just
> complaining
> > about the problem.
> > 
> > BTW, I'm on the lookout for more "hack syntax" that I can
> incorporate into
> > the script. I've added all the ones I know of. If you know of
> specific
> > coding that is incorporated htrough a CFM page, please email me OFF
> LIST so
> > I can see about increasing the power of my cf_antihack script.
> 
> Why a filter looking for words in a URL?
> 
> AFAIK the issue is that code (like DROP, INSERT, DELETE, UPDATE, ALTER
> and possibly functions/vbscript etc.) is executed in the database.
> What 
> code can be executed? Wouldn't that be code that is not escaped? So
> that 
> means that everything between proper quotes is safe by definition.
> What 
> is left is dates, numbers etc. Well, simply use cfqueryparam for them
> and you are done.
> 
> Or am I misunderstanding something here?
> 
> Jochem
> 
> PS Some suggestions for Josh:- check formfields too
> - URLDECODE everything so you can use regex pattern matching (instead 
> of ";%20DROP%20TABLE%20" match 
> "[[:space:]]*;[[:space:]]*drop[[:space:]]*table[[:space:]]*" so I 
> can't simply replace a space with a tab and bypass your filter
> - check for all the abovementioned statements
> 
> 
>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to