RE: Oracle SQL Injection vulnerability

From: Attari Attari (c70n3@yahoo.co.in)
Date: Mon Nov 19 2007 - 20:56:42 EST


Hey Paul, thanks for that. But the given link doesn't
work.

Does anyone have an offline copy by chance? If yes,
can you bother to send me?

Thanks.

--- Paul Melson <pmelson@gmail.com> wrote:

> > Does that mean the site is vulnerable to SQL
> Injection? I tried ' OR 1=1--
> and ' OR '1'='1'--
> > but I get same error message.
>
> Yes, and as it stands, this is definitely a finding
> for your client
> regardless of whether or not you are able to exploit
> it. But of course, you
> want to exploit it both to make a credible argument
> to your client as well
> as to feel cool.
>
> I recommend Mavituna's Oracle SQL Injection Cheat
> Sheet:
>
>
http://ferruh.mavituna.com/makale/oracle-sql-injection-cheat-sheet/
>
> PaulM
>
>
>
>
------------------------------------------------------------------------
> This list is sponsored by: Cenzic
>
> Need to secure your web apps NOW?
> Cenzic finds more, "real" vulnerabilities fast.
> Click to try it, buy it or download a solution FREE
> today!
>
> http://www.cenzic.com/downloads
>
------------------------------------------------------------------------
>
>

      Bring your gang together - do your thing. Go to http://in.promos.yahoo.com/groups

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:13 EDT