------------------------
 [EMAIL PROTECTED] wrote:
------------------------
[snip]
>I refer to the pdf
>
>http://www.nextgenss.com/papers/advanced_sql_injection.pdf


Wow, very interesting read. I for one wasn't aware of this problem. It's really nice 
to have a sysadmin sharing his experiences. Usually, that's a far-from-my-bed-show for 
most of us, but I surely think it's refreshing.


>for more information. Be aware that more than simple removal of 'bad
>characters' is needed in order to protect oneself fully -- ample examples
>and reasons are given in the paper.
>
>My question, finally: Could future versions of Cocoon protect against this
>type of 'database rape' -- for example in the class
>org.apache.cocoon.acting.DatabaseAuthenticatorAction? Would this be a
>sensible place to put the protection? To me it has the immediate advantage
>that I don't have to write any extra code -- no, seriously. For every
>webapp that I write -- and anyone I can think of, for that matter -- this
>type of protection would be necessary for a login system even to be
>useful. Why not put the few if statements in DatabaseAuthenticatorAction?


Well, AFAIU the pdf, there is no "magic solution" to the problem. In fact, there are 3 
solutions proposed, each with their advantages and disadvantages. Which one would you 
like to see implemented? And would that one be satisfactory for all cocoon users?


>Until this question is settled, I will of course have to insert some kind
>of patch into my webapp. But it would be nice if such controls were done
>automatically in the future.


I agree. Now "all" we have to do is to design the magical solution :-)


>Thank you for your attention.


Thank you for your refreshing input.

tomK


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, email: [EMAIL PROTECTED]

Reply via email to