Hi all,
A department here has outsourced their website design to a company who don't seem to see security as a important issue. Their code seems to be a definite target for a SQL injection attack, but I've been unsuccessful in coming up with a way to prove this.
e.g. one page gets a list of rows from the database based on a value from the querystring:
page.php?id=45
$sql = "select * from tablename where something < 1 and somethingelse=$id";
I've tried changing the querystring to:
page.php?id=45;+drop+table+testtable;
so the query becomes:
select * from tablename where something < 1 and somethingelse=45; drop table testtable;
But it doesn't execute (I presume because it's 2 queries). I'm sure this worked with a SQL Server backend when I was testing out one of my ASP apps, but MySQL just throws an error.
Does anyone know how I can delete a test table from the database to prove to the design company they need to do some var checking? If I don't prove it to them then they'll just leave it and someone else will hack it.
Thanks.
C:\DOS:>
C:\DOS:>RUN
RUN DOS RUN!!
A department here has outsourced their website design to a company who don't seem to see security as a important issue. Their code seems to be a definite target for a SQL injection attack, but I've been unsuccessful in coming up with a way to prove this.
e.g. one page gets a list of rows from the database based on a value from the querystring:
page.php?id=45
$sql = "select * from tablename where something < 1 and somethingelse=$id";
I've tried changing the querystring to:
page.php?id=45;+drop+table+testtable;
so the query becomes:
select * from tablename where something < 1 and somethingelse=45; drop table testtable;
But it doesn't execute (I presume because it's 2 queries). I'm sure this worked with a SQL Server backend when I was testing out one of my ASP apps, but MySQL just throws an error.
Does anyone know how I can delete a test table from the database to prove to the design company they need to do some var checking? If I don't prove it to them then they'll just leave it and someone else will hack it.
Thanks.
C:\DOS:>
C:\DOS:>RUN
RUN DOS RUN!!