Full Disclosure mailing list archives

Question: is this exploitable?


From: "Paulo Pereira" <pjp () paulo-pereira net>
Date: Sat, 18 Oct 2003 15:28:09 +0300

Hi,

I'm looking at a web application I built some time back and I found this line:

$sth = $dbh->prepare("insert into projects values(null,\"$project\")");

I'm using Perl. 

This works quite exploitable to me since $project comes directly from user without any validation :)

The thing is that I'm yet to find a way to exploit it on the MySQL database I'm using.

I tried to make $project like:

"); insert into other_table value(bla, bla

but prepare only runs one command and complains about this...

I also tried

" + (insert into other_table value(bla, bla

And a bunch of combinations but I still didn't get the right touch at it and I would like to understand how these 
things work.

Reading this list is quite helpuful, I already found a dozen ways to DoS my application with the insertion of scripts.

I think my app was (was?) really.. :) insecure.

Thanks!

Paulo Pereira

Current thread: