Penetration Testing mailing list archives
Re: Cold Fusion and Sql Injection
From: "morning_wood" <se_cur_ity () hotmail com>
Date: Fri, 20 Jun 2003 12:30:51 -0700
mby some help at http://nothackers.org/pipermail/0day/2003-June/000091.html ----- Original Message ----- From: "George Fekkas" <G.Fekkas () encode-sec com> To: <pen-test () securityfocus com> Sent: Friday, June 20, 2003 10:12 AM Subject: Cold Fusion and Sql Injection
****************************************************************** Any views expressed in this message are those of the individual sender, except where the sender specifically states them to be the views of ENCODE S.A. ******************************************************************
---------------------------------------------------------------------- ----------
I am performing a web application penetration test by using SQL
Injection method.The site uses Cold fusion. My problem is that anything I pass as a parameter to a field and I get the following error.
ODBC Error Code = 22005 (Error in assignment) [Microsoft][ODBC SQL Server Driver][SQL Server]Syntax error
converting the nvarchar value ‘my parameter here’ to a column of data type int.
For example, if I place a simple quote I get the following: Syntax error converting the nvarchar value ‘’’ to a column of data
type int.
Or if I place a @@Version function I get the following: Syntax error converting the nvarchar value ‘@@Version’ to a column
of data type int.
Etc.. Normally, when you pass a single quote as a parameter, the Server
returns the following:
ODBC Error Code = 37000 (Syntax error or access violation), and the
error message is normally ‘Incorrect syntax error …’ OR ‘Unclosed quotation mark …’
Does anyone know how to solve this problem?Can anyone tell me what
really happens behind it? I mean how the cold fusion application handles input validation in conjunction with ODBC driver?Does cold fusion use special functions for input validation?
Thank you for your time, George
---------------------------------------------------------------------- ----------
--------------------------------------------------------------------
-------
Latest attack techniques. You're a pen tester, but is google.com still your R&D team? Now you
can get
trustworthy commercial-grade exploits and the latest techniques from
a
world-class research group. Visit us at: www.coresecurity.com/promos/sf_ept1 or call 617-399-6980 --------------------------------------------------------------------
-------- --------------------------------------------------------------------------- Latest attack techniques. You're a pen tester, but is google.com still your R&D team? Now you can get trustworthy commercial-grade exploits and the latest techniques from a world-class research group. Visit us at: www.coresecurity.com/promos/sf_ept1 or call 617-399-6980 ----------------------------------------------------------------------------
Current thread:
- Cold Fusion and Sql Injection George Fekkas (Jun 20)
- Re: Cold Fusion and Sql Injection morning_wood (Jun 20)
- Re: Cold Fusion and Sql Injection Javier Fernandez-Sanguino (Jun 23)
- Re: Cold Fusion and Sql Injection Cesar (Jun 23)
- Re: Cold Fusion and Sql Injection morning_wood (Jun 20)