You mean "SQL Injection exploit". "Cross site scripting" is a different exploit.
If you can pass through multiple SQL commands through to your CFQUERY and your 
database perms allow the user being used by CF to perform a drop, then yes.

> -----Original Message-----
> From: Terry Riley [mailto:[EMAIL PROTECTED]
> Sent: 12 November 2003 11:47
> To: [EMAIL PROTECTED]
> Subject: RE: [ cf-dev ] Use of <cfqueryparam>
> 
> 
> OK, I'm convinced! Having run a few tests using CF5/SQL2K, I 
> see what you 
> mean.
> 
> However, shouldn't it be good practice to use the cfsqltype 
> attribute, 
> and, where chracter variables are concerned, the maxlength attribute 
> also?
> 
> Is there any way (when the <cfqueryparam> is not being used), 
> to cause a 
> cross-scripting exploit to (say) drop another table, by 
> adding 'DROP TABLE 
> xxx' onto the end of a URL - I couldn't get it to work at all.
> 
> Cheers
> Terry
> 
> ----------Original Message---------  
> 
> > The CFSQLTYPE is used to validate the input. Use of the 
> cfqueryparam 
> > tag will always have the effect of preventing SQL injection. e.g.
> > 
> > The following uses a cfquery param tag without the 
> cfsqltype attribute:
> > 
> > test (Records=1, Time=10ms)
> > SQL = 
> > SELECT *
> > FROM event
> > where eventid = ?
> > 
> > Query Parameter Value(s) -
> > Parameter #1 = 123
> > 
> > Steve
> > 
> > 
> > 
> > > -----Original Message-----
> > > From: Terry Riley [mailto:[EMAIL PROTECTED]
> > > Sent: 12 November 2003 09:10
> > > To: [EMAIL PROTECTED]
> > > Subject: Re: [ cf-dev ] Use of <cfqueryparam>
> > > 
> > > 
> > > But only if qualified by the cfsqltype, as far as I can tell.
> > > 
> > > Anyone else care to comment?
> > > 
> > > Cheers
> > > Terry
> > > 
> > > ----------Original Message---------  
> > > 
> > > > Terry,
> > > > 
> > > > As I understand it using <cfqueryparam stops any SQL being 
> > > hacked in to 
> > > > the
> > > > query through the url or form var. It ensures that the 
> > > passed variable 
> > > > is
> > > > treated as a variable and not read as anything else.
> > > > 
> > > > d
> > > > 
> > > > ----- Original Message ----- 
> > > > From: "Terry Riley" <[EMAIL PROTECTED]>
> > > > To: <[EMAIL PROTECTED]>
> > > > Sent: Tuesday, November 11, 2003 1:30 PM
> > > > Subject: [ cf-dev ] Use of <cfqueryparam>
> > > > 
> > > > 
> > > > > I've seen a lot of code lately where the query 
> (either extracting,
> > > > > inserting or updating information) uses the
> > > > >
> > > > > <cfqueryparam value="#xxx#"> in the WHERE clause, without 
> > > qualifying 
> > > > > > the
> > > > > parameter with a cfsqltype.
> > > > >
> > > > > I can understand the use of the cfqueryparam with a 
> cfsqltype and 
> > > > > other
> > > > > attributes as one way of preventing cross-site 
> scripting (adding
> > > > > additional text to the string to do something evil), but 
> > > see no point 
> > > > > in
> > > > > using
> > > > >
> > > > > 'WHERE ID = <cfqueryparam value="#url.ID#">'
> > > > >
> > > > > as opposed to
> > > > >
> > > > > 'WHERE ID = "#url.ID#"'
> > > > >
> > > > > Is there one? Is it faster? Manuals and googles don't 
> > > seem to come up 
> > > > > with
> > > > > an answer.....
> > > > >
> > > > > Cheers
> > > > > Terry
> 
> 
> 
> -- 
> ** Archive: http://www.mail-archive.com/dev%40lists.cfdeveloper.co.uk/
> 
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
> For human help, e-mail: [EMAIL PROTECTED]
> 
> 

--
** Archive: http://www.mail-archive.com/dev%40lists.cfdeveloper.co.uk/

To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
For human help, e-mail: [EMAIL PROTECTED]

Reply via email to