One of my sites is being hit with an attempt to hack into it or at least
that is what I assume. The following SQL is being added where they think
it will get processed

+AND+(SELECT+8041+FROM(SELECT+COUNT(%2A),CONCAT(0x3a6f79753a,(SELECT+(CASE+WHEN+(8041%3D8041)+THEN+1+ELSE+0+END)),0x3a70687a3a,floor(rand(0)%2A2))x+FROM+INFORMATION_SCHEMA.CHARACTER_SETS+GROUP+BY+x)a)+AND+(7609%3D7609
---probably truncated?----

I can see traffic about INFORMATION_SCHEMA.CHARACTER_SETS being missing
and people needing to update to MySQL 5, but I am a little curious as to
what this is trying to achieve?

Needless to say my framework does not allow any injections like this to
be processed anyway. It's just creating a lot of traffic on the error
log and if it persists I'll add some handling and create a page saying
why Firebird does not suffer from that vulnerability ;)

-- 
Lester Caine - G8HFL
-----------------------------
Contact - http://lsces.co.uk/wiki/?page=contact
L.S.Caine Electronic Services - http://lsces.co.uk
EnquirySolve - http://enquirysolve.com/
Model Engineers Digital Workshop - http://medw.co.uk
Rainbow Digital Media - http://rainbowdigitalmedia.co.uk
  • [firebird-support] Hack... Lester Caine les...@lsces.co.uk [firebird-support]

Reply via email to