hi,
Postgresql team has released the new .4 version as security fix.
http://www.postgresql.org/docs/techdocs.52
This is related to addslash and Unicode like charmaps.
<quote>
A few weeks ago, members of our Japanese developer community contacted
us with news of a SQL injection exploit for PostgreSQL with PHP in Far
Eastern character encodings such as SJIS. It seemed that a clever
attacker could exploit knowledge of how multi-byte encodings and string
escaping work inside PostgreSQL in order to sneak injected SQL strings
past all commonly used client-side safeguards. Subsequent investigation
showed that related attacks would work in all multi-byte encodings, in
particular UTF8 which is widely used world-wide.
</quote>
This is probably true for other SQL backends as well.
Now, they turned off the backslash escaping with some charmaps :
<quote>
When the client is using a "client only" encoding (SJIS, BIG5, GBK,
GB18030, or UHC) the server furthermore rejects uses of "\'" to
represent a single quote mark in a SQL string literal. This historical
usage has been deprecated for some time in favor of the SQL-standard
representation "''" (two single quote marks)
</quote>
Also, the use of parameterized prepared statements is the best practice
to avoid SQL injection, because all the tests and formating checks from
standard Psql libs are processed.
<quote>
Use parameterized prepared statements to execute queries (e.g. "SELECT *
FROM table WHERE id = ?")
</quote>
Now, that said, I wish to know if OTRS is ready to work with thoses
changes.
Regards
--
Alexandre
_______________________________________________
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs
Support oder Consulting für Ihr OTRS System?
=> http://www.otrs.de/