Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Re: ISA Server and SQL Injection
From: Bogdan Tomchuk (bogdan.tomchukpolytechnique.fr)
Date: Thu Feb 17 2005 - 12:50:53 CST
Protection against this kind of injection is just other way of patching the
code, so useless, because this assume knowing difference between "good" and
"bad" URL, so for OWA, for example, you define list of templates for all
known "good" URL and anything else will be consider as SQL injection. I do
not understand why to spend money on expensive firewall staff if you can
patch or upgrade software.
Keep your software current is always better then "imaginable" security given
by software level firewall especially against SQL injection.
> > Problem is the same: By seeing URL you have no
> > reliable way to say which parameter will be used in SQL query and how
> > (with/without transformation). Only application knew it.
> Yes sure, if you code application using in parameter some SQL query, you
> should read "howto do secure code for webapp"....
> Application mainly use value after used by the application inside a
> query, but the query is in the code.
> http://www.toto.com/test.php?product_id=4 is ok and there is NO WAY to
> see here some SQL Syntax.
> %20id=4 is not ok, and you shoud fire developper doing this....