Re: New form of sql injection hack documented
Date: Sun, 27 Apr 2008 21:40:24 -0700 (PDT)
Message-ID: <24090.78556.qm@web38908.mail.mud.yahoo.com>
and be wary of any dynamic SQL! :-) That execute immediate stuff scares the willies out of me! :)
Robert G. Freeman
Author:
Oracle Database 11g New Features (Oracle Press)
Portable DBA: Oracle (Oracle Press)
Oracle Database 10g New Features (Oracle Press)
Oracle9i RMAN Backup and Recovery (Oracle Press)
Oracle9i New Feature
Blog: http://robertgfreeman.blogspot.com (Oracle Press)
- Original Message ---- From: David Aldridge <david_at_david-aldridge.com> To: oracle-l_at_freelists.org Sent: Sunday, April 27, 2008 7:12:24 PM Subject: Re: New form of sql injection hack documented
So long story short ... use bind variables?
- Original Message ---- From: "Adams, Matthew (GE Indust, ConsInd)" <MATT.ADAMS_at_GE.COM> To: oracle-l_at_freelists.org Sent: Friday, April 25, 2008 10:07:39 AM Subject: New form of sql injection hack documented
FYI
yesterday, david litchfield released a paper describing how a sql injection attack could be done on a pl/sql routine that does dynamic statement creation, even if the routine has no parameters and no user interaction.
it's an interesting read.
http://www.davidlitchfield.com/blog/archives/00000041.htm
Matt Adams - GE Consumer and Industrial Database Administration
It will make sense as soon as you stop thinking logically and start thinking oracle-ly. - Jim Droppa
--
http://www.freelists.org/webpage/oracle-l
Received on Sun Apr 27 2008 - 23:40:24 CDT