Penetration Testing mailing list archives
XPath injection doubt
From: Anne Beckman <anne.beckman () gmail com>
Date: Sat, 24 Sep 2005 09:13:37 +0530
I am learning the XPath injection technique. To bypass authentication, we give a string like: hi' or 1=1 or 'hey'='hello I noticed that the equivalent string in SQL Injection would have been shorter: hi' or 1=1-- I understand that XPath does not have comments, so we cannot use the -- technique to comment out the rest of the query. But how does that additional OR clause with 'hey'='hello solve the problem too? Thank-you, Anne ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- XPath injection doubt Anne Beckman (Sep 24)
- RE: XPath injection doubt Andy JKC (Sep 24)