Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Re: Simple to exploit SQL Injection ?
From: bryan allott (homegrownbryanallott.net)
Date: Mon Nov 28 2005 - 13:42:44 CST
just a by-the-by...
although not a successful SQL injection attack, the error message you're
receiving as a public user already tell you a little about their database...
Probably not too much to go with, but a better exception message would have
"Invalid credentials" or something equally generic and less revealing.
so probably also be on the lookout for other places where more information
is displayed than usual..
other famous .Net parser and other jit compile errors tell u quite a bit
about the filesystem :)
----- Original Message -----
From: "Jason binger" <cisspstudyyahoo.com>
Sent: Monday, November 28, 2005 2:49 AM
Subject: Simple to exploit SQL Injection ?
I am reviewing a .Net web application. When entering
xyz for a username and ' for a password into a form I
receive the following stack trace (extract):
System.Exception: Can't Load DataReader using SQL
string: 'SELECT * FROM users WHERE username = 'xyz'
AND password = '''' -- Unclosed quotation mark before
the character string '''. Line 1: Incorrect syntax
Now I would have thought this would be easy to
exploit, but I can't bypass the logon page. xyz is a
valid username. Any ideas?
Yahoo! Mail - PC Magazine Editors' Choice 2005
No virus found in this incoming message.
Checked by AVG Free Edition.
Version: 7.1.362 / Virus Database: 267.13.8/184 - Release Date: 27-Nov-05