This is probably the biggest security problem with web applications.  It
boils down to securing and validating your input.  Most of these attacks
are successful only when you're evaluating a number - since a string
won't execute SQL, but only evaluate it as a string input.  So if you're
expecting numbers, then validate, using isNumeric() or CFQueryParam.  

---
Billy Cravens


-----Original Message-----
From: Ian Lurie [mailto:[EMAIL PROTECTED]] 
Sent: Friday, April 12, 2002 10:17 AM
To: CF-Talk
Subject: Preventing SQL injection attacks...?

Hi all,

Had some interesting errors in our logs yesterday. It appears that
someone's
trying to hack our database by inserting SQL query language into the URL
string.

We're doing all the standard security measures, including filtering for
single quotes, using database passwords, and the like, and we locked out
their IP immediately. But really, how do you prevent this? Any
ideas/feedback out there?

Ian

Portent Interactive
Helping clients build customer relationships on the web since 1995
Consulting, design, development, measurement
http://www.portentinteractive.com


______________________________________________________________________
Your ad could be here. Monies from ads go to support these lists and provide more 
resources for the community. http://www.fusionauthority.com/ads.cfm
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to