> "One of my favorites is the use of the SQL Server system stored
> procedure xp_cmdshell to open a command shell, which can be used to
> fetch a file from an attacker's FTP server and run it."
> 
> I always knew Dave was a cracker (not hacker!) extraordinaire :-)

Oh, hardly. I didn't discover it myself, I've never used it without explicit
permission in order to demonstrate a vulnerability to a client, and I
couldn't find a buffer overflow to save my life, due to my poor
C/assembler/disassembler skills.

Seriously, though, it's unfortunate but true that if you're in the business
of developing and deploying open network applications, you have to be aware
of the security implications and requirements. It's been my experience that
very few people pay adequate attention to this until it's too late.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
voice: (202) 797-5496
fax: (202) 797-5444

______________________________________________________________________
Signup for the Fusion Authority news alert and keep up with the latest news in 
ColdFusion and related topics. http://www.fusionauthority.com/signup.cfm
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to