From: Jim Halfpenny (jimsmailinglists@gmail.com)
Date: Mon Jun 25 2007 - 13:08:46 EDT
On 13 Jun 2007 19:55:07 -0000, wymerzp@sbu.edu <wymerzp@sbu.edu> wrote:
> I was looking over a client's website when I discovered a classic (almost cliche) sql injection vulnerability (i.e. Username ' OR ''=' | Password ' OR ''='). I did more poking and prodding and discovered that they are using MS Access for a backend. I know you can't string queries together (i.e. Select user from tbl where blah = var; Select...). My question is then, is there any 'good way' to use sql injection against this database to drive home the severity of the lack of input validation? Currently, the best I got was access to non-sensitive information that one simply needed to supply an email for.
>
> Thanks a lot,
>
> Zach
If any of the error messages give a clue as to the location of the
database .mdb file see if you can download it. Another common mistake
is to put the database in the web root somewhere.
Regards,
Jim Halfpenny
------------------------------------------------------------------------
This List Sponsored by: Cenzic
Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!
http://www.cenzic.com/c/2020
------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:54 EDT