WebApp Sec mailing list archives

Re: magic_quotes


From: "Matt Fisher" <mattfisher () comcast net>
Date: Tue, 18 Jan 2005 22:27:07 -0500

I did some really really limited testing on this, but :

Annoy your  DBA:  " ;shutdown "
Get Beat Silly by your DBA : " ; drop prod_db "

both worked for me with ASP against MSDE with the site logging into the db
as
SA.   No quotes in them, great for ints .... not even the usual "union"
operator...



----- Original Message ----- 
From: "Wojciech Pawlikowski" <wojtek () vline pl>
To: <webappsec () securityfocus com>
Sent: Friday, January 14, 2005 1:59 AM
Subject: magic_quotes


Hey,
I'm doing penetration test for some company using OSSTMM methodology.
During information gathering stage I've found some SQL injection bug
in their webapp. All I know is they've got some Oracle DB and Linux
webserver with mod_php4 module.

My problem is perhaps well known - is there any possibility to bypass
magic_quotes protection ? PHP is 4.3.2, but I don't remember any
vulnerability regarding magic_quotes in this version.

-- 
* Wojciech Pawlikowski :: <ducer at hard-core pl> :: NIC-HDL WP5161-RIPE *
* http://ducer.w00nf.org :: http://www.knockdownhc.com ::  Born to Hate  *


-- 
No virus found in this incoming message.
Checked by AVG Anti-Virus.
Version: 7.0.300 / Virus Database: 265.6.11 - Release Date: 1/12/2005





-- 
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.300 / Virus Database: 265.6.13 - Release Date: 1/16/2005


Current thread: