From: Andy JKC (andy@inetconsulting.co.uk)
Date: Sat Sep 24 2005 - 12:28:20 EDT
As the entire query is likely in [] with Xpath, unlike sql.
You get e.g.;
(//user[name/text()=' + InsertString + '])
Where the "hi' or 1=1 or 'hey'='hello" string deals with the surrounding
''s, giving you room to inject 1=1 to return a positive.
Whereas with e.g.;
select * from [table] where username = ' + InsertString + ';
The "hi' or 1=1--" string closes the ''s, returns a positive (1=1) and then
comments following sql out (--).
Hope that helps,
Andy.
P.S. There's a decent paper at
http://www.watchfire.com/resources/blind-xpath-injection.pdf
-----Original Message-----
From: Anne Beckman [mailto:anne.beckman@gmail.com]
Sent: 24 September 2005 04:44
To: pen-test@securityfocus.com
Subject: XPath injection doubt
I am learning the XPath injection technique. To bypass authentication,
we give a string like:
hi' or 1=1 or 'hey'='hello
I noticed that the equivalent string in SQL Injection would have been
shorter:
hi' or 1=1--
I understand that XPath does not have comments, so we cannot use the
-- technique to comment out the rest of the query. But how does that
additional OR clause with 'hey'='hello solve the problem too?
Thank-you,
Anne
----------------------------------------------------------------------------
-- Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 ---------------------------------------------------------------------------- --- ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:59 EDT