FW: [KCFusion] Link to article about CF tips

2000-08-06 Thread Brian Kotek



-Original Message-
From: Brian Kotek [mailto:[EMAIL PROTECTED]]
Sent: Sunday, August 06, 2000 6:21 PM
To: Daryl Banttari
Subject: RE: [KCFusion] Link to article about CF tips


Can you be more specific...what do you disagree with?  If you are referring
to using FORM variables in your query, please note that the form value is
not a text input but a checkbox, where the user has no power to change the
form value.  If you are that concerned about someone posting malformed FORM
values you could always check the variable's contents prior to executing the
query.

You might also notice that I cover cross-site scripting and URL/FORM
variable hacking on its own page.

Other than that I can't see what you are concerned about.

Thanks,

Brian


-Original Message-
From: Daryl Banttari [mailto:[EMAIL PROTECTED]]
Sent: Saturday, August 05, 2000 2:44 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: [KCFusion] Link to article about CF tips


 At 10:40 AM 8/4/2000 -0500, Keith Purtell wrote:
 In case you haven't already seen this article ...
 
 http://www.builder.com/Programming/ColdFusionTips/print.html

Wow... unless you've /seriously/ locked down your database permissions, I
wouldn't recommend many of those techniques at all!

See the Allaire Security Bulletin ASB99-04, "Multiple SQL Statements in
Dynamic Queries", at
http://www.allaire.com/handlers/index.cfm?ID=8728Method=Full

Remember to second-guess any article you read.  In general, just because it
was a neat idea, doesn't necessarily mean its a good idea.

Also remember that all generalizations are false ;-)

Daryl Banttari
Sr. Consultant
Allaire Consulting


 
 
__
The KCFusion.org list and website is hosted by Humankind Systems, Inc.
List Archives http://www.mail-archive.com/cf-list@kcfusion.org
Questions, Comments or Glowing Praise.. mailto:[EMAIL PROTECTED]
To Subscribe mailto:[EMAIL PROTECTED]
To Unsubscribe mailto:[EMAIL PROTECTED]
 



Fwd: RE: [KCFusion] Link to article about CF tips

2000-08-06 Thread Daryl Banttari


Date: Sun, 06 Aug 2000 18:55:41 -0500
To: "Brian Kotek" [EMAIL PROTECTED]
From: Daryl Banttari [EMAIL PROTECTED]
Subject: RE: [KCFusion] Link to article about CF tips

Brian,

It's not "users" I'm worried about.  A couple of weeks ago, I was 
reviewing code for a site where they passed the file name of a file to 
mail to a user in a hidden input field...  They said that since the user 
doesn't see that, they're safe, right?

I saved the HTML output to disk, made the action URL non-relative and 
specified a file /no user/ should be downloading, pulled up my local copy, 
and clicked submit.  They were quite surprised at the results.

A plague of the Web industry -- and ColdFusion code in particular -- is 
the lack of attention paid to security issues.  If I had a nickel for 
every time I see someone passing unchecked vars into forms, I wouldn't 
have to work :-)

I would have been much happier with your examples if they included the 
code to check the variables and ensure no form hacking has 
occurred.  Honestly, I consider posting examples this (powerful | 
dangerous) without including the code to make it safe [/in/ the example] 
rather irresponsible.  That way, when programmers not as clever as you 
copy and paste the code into their apps, it happens safely.

'If you are that concerned about someone posting malformed FORM values you 
could always check the variable's contents prior to executing the query.'
...All ColdFusion programmers should be 'that concerned'!

Please don't consider this a flame-- if we were meeting in person, I would 
be using the same tone of voice.  I'm /very/ concerned about the security 
problems left in ColdFusion code on a regular basis.  (It's giving 
ColdFusion a bad name in the security industry--  I've actually heard 
objections to using ColdFusion because of the security weaknesses 'in 
ColdFusion' when it's bad site programming to blame.)

Sincerely,

Daryl Banttari

At 06:20 PM 8/6/2000 -0400, Brian Kotek wrote:
Can you be more specific...what do you disagree with?  If you are referring
to using FORM variables in your query, please note that the form value is
not a text input but a checkbox, where the user has no power to change the
form value.  If you are that concerned about someone posting malformed FORM
values you could always check the variable's contents prior to executing the
query.

You might also notice that I cover cross-site scripting and URL/FORM
variable hacking on its own page.

Other than that I can't see what you are concerned about.

Thanks,

Brian


-Original Message-
From: Daryl Banttari [mailto:[EMAIL PROTECTED]]
Sent: Saturday, August 05, 2000 2:44 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: [KCFusion] Link to article about CF tips


  At 10:40 AM 8/4/2000 -0500, Keith Purtell wrote:
  In case you haven't already seen this article ...
  
  http://www.builder.com/Programming/ColdFusionTips/print.html

Wow... unless you've /seriously/ locked down your database permissions, I
wouldn't recommend many of those techniques at all!

See the Allaire Security Bulletin ASB99-04, "Multiple SQL Statements in
Dynamic Queries", at
http://www.allaire.com/handlers/index.cfm?ID=8728Method=Full

Remember to second-guess any article you read.  In general, just because it
was a neat idea, doesn't necessarily mean its a good idea.

Also remember that all generalizations are false ;-)

Daryl Banttari
Sr. Consultant
Allaire Consulting


 
 
__
The KCFusion.org list and website is hosted by Humankind Systems, Inc.
List Archives http://www.mail-archive.com/cf-list@kcfusion.org
Questions, Comments or Glowing Praise.. mailto:[EMAIL PROTECTED]
To Subscribe mailto:[EMAIL PROTECTED]
To Unsubscribe mailto:[EMAIL PROTECTED]
 



Re: [KCFusion] Link to article about CF tips

2000-08-05 Thread Daryl Banttari

 At 10:40 AM 8/4/2000 -0500, Keith Purtell wrote:
 In case you haven't already seen this article ...
 
 http://www.builder.com/Programming/ColdFusionTips/print.html

Wow... unless you've /seriously/ locked down your database permissions, I 
wouldn't recommend many of those techniques at all!

See the Allaire Security Bulletin ASB99-04, "Multiple SQL Statements in 
Dynamic Queries", at
http://www.allaire.com/handlers/index.cfm?ID=8728Method=Full

Remember to second-guess any article you read.  In general, just because it 
was a neat idea, doesn't necessarily mean its a good idea.

Also remember that all generalizations are false ;-)

Daryl Banttari
Sr. Consultant
Allaire Consulting


 
 
__
The KCFusion.org list and website is hosted by Humankind Systems, Inc.
List Archives http://www.mail-archive.com/cf-list@kcfusion.org
Questions, Comments or Glowing Praise.. mailto:[EMAIL PROTECTED]
To Subscribe mailto:[EMAIL PROTECTED]
To Unsubscribe mailto:[EMAIL PROTECTED]