To my knowledge "sql insertion attacks" generally only happen (at least in
ColdFusion) when your code is fairly lenient / open ...

For instance ... something like this...

<cflock scope="session">
<cfloop item="x" colleciton="url">
        <cfset session[x] = url[x]>
</cfloop></cflock>

Then on another page

<cfquery name="rsdelete">
        DELETE FROM #session.sqltable#
        WHERE #session.sqltable#_ID
                IN ( #session.selecteditems# )
</cfquery>

Or worse yet:

<cfquery name="rsdostuff">
        #preservesinglequotes(session.sqlstatement)#
</cfquery>

Now, the person who might have written this code (or code like it) I'm sure
would have been expecting all of those variables to have been set by
legitimate features of their application or site, however, you can see how
easily the open-architecture ( which might make adding new features very
easy, if sloppy and error prone ) could and likely would quickly lead to
certain unscrupulous people doing things they shouldn't...

There are more obscure examples...

<cfquery name="rsupdate">
        UPDATE USERS SET
        layoutselection = #url.layoutselection#
        WHERE USERID = #url.userid#
</cfquery>

could potentially cause problems if url.layoutselection isn't validated as a
number and a user enters something like
"&layoutselection=5,securitylevel%XX500" into the url... and suddenly a
utility designed to allow the user to change their preferences has allowed
them to become an administrator on the site...

hth

Isaac

www.turnkey.to
954-776-0046

______________________________________________________________________
Your ad could be here. Monies from ads go to support these lists and provide more 
resources for the community. http://www.fusionauthority.com/ads.cfm
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to