[nycphp-talk] Trimming Posts WAS: Injection Attack, any ideas?
Hans Zaunere
lists at zaunere.com
Wed Nov 7 07:50:49 EST 2007
All,
Please remember to trim your posts and subjects (and don't top-post like I
just did :)
Thanks,
---
Hans Zaunere / President / New York PHP
www.nyphp.org / www.nyphp.com
mikesz at qualityadvantages.com wrote on Wednesday, November 07, 2007
12:40 AM:
> Hello Jake,
>
> Wednesday, November 7, 2007, 1:17:14 PM, you wrote:
>
> > Try:
>
> > http://cl1p.net/
>
> > I'd be willing to take a look after you post it.
>
> > - jake
>
> > On Nov 7, 2007 12:12 AM, <mikesz at qualityadvantages.com> wrote:
> > > Hello Jake,
> > >
> > >
> > > Wednesday, November 7, 2007, 12:52:11 PM, you wrote:
> > >
> > > > Without divulging who your client is, would it be possible to
> > > > remove any references to their site/company from the offending
> > > > code and post it here? Without access to your registration.php
> > > > script I think we'll all just be wasting our time with wild
> > > > guesses.
> > >
> > > > - jake
> > >
> > > > On Nov 6, 2007 11:31 PM, <mikesz at qualityadvantages.com> wrote:
> > > > > Hello All,
> > > > >
> > > > > I have a client site that has a registration form with a
> > > > > captcha image that is suppose to prevent spammers from
> > > > > dumping their junk. The form has two text input windows and a
> > > > > fair amount of personal information is collected as well.
> > > > >
> > > > > I just noticed that this client has been getting regular
> > > > > injection attacks that have been failing because it is a
> > > > > comment spammer and the INSERT query is failing on a
> > > > > duplicate key error. For privacy and security reasons I can
> > > > > not post the error message but it cites the php file name and
> > > > > the injection looks like it is being added to one of the text
> > > > > boxes.
> > > > >
> > > > > The form has "Required" fields as well as a check function
> > > > > that is suppose to check for valid input. All of those fields
> > > > > are empty in the query that failed.
> > > > >
> > > > > The question is, actually multiple related questions:
> > > > >
> > > > > First how did that bad guy "execute" the query without
> > > > > hitting the submit button or entering the captcha code and
> > > > > how did it bypass the check function. It seems like the query
> > > > > was sent directly to the database though the registration.php
> > > > > program but I have no clue how that could have happened. I
> > > > > need to plug this hole but don't have any idea where to start
> > > > > looking for it.
> > > > >
> > > > > I have tried running the query like registration.php?query
> > > > > but that didn't work.
> > > > >
> > > > > Any ideas about how I can reproduce this problem would greatly
> > > > > appreciate and any suggestions about how to fix it would be
> > > > > even more greatly appreciated. 8-)
> > > > >
> > > > > Thanks for your attention.
> > > > >
> > > > >
> > > > > --
> > > > > Best regards,
> > > > > mikesz
> > > > > mailto:mikesz at qualityadvantages.com
> > > > >
> > > > > _______________________________________________
> > > > > New York PHP Community Talk Mailing List
> > > > > http://lists.nyphp.org/mailman/listinfo/talk
> > > > >
> > > > > NYPHPCon 2006 Presentations Online
> > > > > http://www.nyphpcon.com
> > > > >
> > > > > Show Your Participation in New York PHP
> > > > > http://www.nyphp.org/show_participation.php
> > > > >
> > > > _______________________________________________
> > > > New York PHP Community Talk Mailing List
> > > > http://lists.nyphp.org/mailman/listinfo/talk
> > >
> > > > NYPHPCon 2006 Presentations Online
> > > > http://www.nyphpcon.com
> > >
> > > > Show Your Participation in New York PHP
> > > > http://www.nyphp.org/show_participation.php
> > >
> > > > __________ NOD32 2642 (20071106) Information __________
> > >
> > > > This message was checked by NOD32 antivirus system.
> > > > http://www.eset.com
> > >
> > > Actually, the script code is not problem but its over 500 lines of
> > > code so I am not sure it is appropriate to post it here?
> > >
> > >
> > > --
> > >
> > > Best regards,
> > > mikesz
> > > mailto:mikesz at qualityadvantages.com
> > >
> > > _______________________________________________
> > > New York PHP Community Talk Mailing List
> > > http://lists.nyphp.org/mailman/listinfo/talk
> > >
> > > NYPHPCon 2006 Presentations Online
> > > http://www.nyphpcon.com
> > >
> > > Show Your Participation in New York PHP
> > > http://www.nyphp.org/show_participation.php
> > >
> > _______________________________________________
> > New York PHP Community Talk Mailing List
> > http://lists.nyphp.org/mailman/listinfo/talk
>
> > NYPHPCon 2006 Presentations Online
> > http://www.nyphpcon.com
>
> > Show Your Participation in New York PHP
> > http://www.nyphp.org/show_participation.php
>
> > __________ NOD32 2642 (20071106) Information __________
>
> > This message was checked by NOD32 antivirus system.
> > http://www.eset.com
>
>
> Here is the URL : http://cl1p.net/myexploitedcode/
>
> thanks, mikesz
>
> --
> Best regards,
> mikesz mailto:mikesz at qualityadvantages.com
>
> _______________________________________________
> New York PHP Community Talk Mailing List
> http://lists.nyphp.org/mailman/listinfo/talk
>
> NYPHPCon 2006 Presentations Online
> http://www.nyphpcon.com
>
> Show Your Participation in New York PHP
> http://www.nyphp.org/show_participation.php
More information about the talk
mailing list