Please start any new threads on our new site at https://forums.sqlteam.com. We've got lots of great SQL Server experts to answer whatever question you can come up with.

 All Forums
 Other Forums
 Other Topics
 vulnerabilities in current database

Author  Topic 

zeta
Starting Member

1 Post

Posted - 2009-03-29 : 15:19:20
My site is currenty being attacked by a spammer/bot . After looking into this problem, there is some sought of security hold in the site. Does anyone here know how to fix this problem:

Platform
SQL 5.1.30
php 5.2.9

What is taking place
A remote attacker could send specially-crafted SQL statements to the toplists.php script using the list parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.

Proiblem
SQL injection vulnerability in toplists.php in eFiction 3.0 and 3.4.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the list parameter.

References
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
MILW0RM:5785
URL:http://www.milw0rm.com/exploits/5785
BID:29658
URL:http://www.securityfocus.com/bid/29658
SECUNIA:30606
URL:http://secunia.com/advisories/30606
XF:efiction-toplists-sql-injection(42998)
URL:http://xforce.iss.net/xforce/xfdb/42998

I really don't want to use captcha as a means to resolve this issue. Does anyone know how I can resolve this issue and make my site more secure. Thanks Zeta

robvolk
Most Valuable Yak

15732 Posts

Posted - 2009-03-29 : 17:24:50
We're a SQL Server site, with some support for ASP.Net, we don't support MySQL or PHP. There are plenty of sites that do however.
Go to Top of Page
   

- Advertisement -