WebApp Sec mailing list archives
Re: magic_quotes
From: "James Barkley" <James.Barkley () noaa gov>
Date: Fri, 14 Jan 2005 10:48:37 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 http://us3.php.net/manual/en/security.magicquotes.why.php states that "Magic quotes are implemented in PHP to help code written by beginners from being dangerous. Although SQL Injection <security.database.sql-injection.php> is still possible with magic quotes on, the risk is reduced." It only escapes all ' (single-quote), " (double quote), \ (backslash) and NULL characters are escaped with a backslash Depends on the rest of their configuration but if they are using Oracle their is a good chance you can find another way to exploit the sql bug James A. Barkley Wojciech Pawlikowski wrote: |Hey, |I'm doing penetration test for some company using OSSTMM methodology. |During information gathering stage I've found some SQL injection bug |in their webapp. All I know is they've got some Oracle DB and Linux |webserver with mod_php4 module. | |My problem is perhaps well known - is there any possibility to bypass |magic_quotes protection ? PHP is 4.3.2, but I don't remember any |vulnerability regarding magic_quotes in this version. | -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFB5+nTVtbq2E0xxN0RAg+WAJ4xq+1K23kHhU/VTSemGJ+R562x4wCcDUa7 iQNBB/WY8sQMw4uoSaR7Az8= =oUG5 -----END PGP SIGNATURE-----
Current thread:
- magic_quotes Wojciech Pawlikowski (Jan 14)
- Re: magic_quotes James Barkley (Jan 15)
- Re: magic_quotes Matt Fisher (Jan 19)