Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Malicious Injection — It's Not Just For SQL Anymore 119

nywanna writes "When most people think of malicious injection, they think of SQL injection. The fact is, if you are using XML documents or an LDAP directory, you are just as vulnerable to a malicious injection as you would be using SQL. Bryan Sullivan looks at the different types of malicious code injections and examines the very basics of preventing these injections."
This discussion has been archived. No new comments can be posted.

Malicious Injection — It's Not Just For SQL Anymore

Comments Filter:
  • pr0n (Score:5, Funny)

    by macadamia_harold ( 947445 ) on Wednesday November 22, 2006 @02:52PM (#16954778) Homepage
    When most people think of malicious injection, they think of SQL injection.

    Come on now, considering your audience, you might want to re-think that statement.
    • Re:pr0n (Score:5, Funny)

      by spellraiser ( 764337 ) on Wednesday November 22, 2006 @02:55PM (#16954844) Journal

      Yeah. Malicious Injection was a pretty good flick. I can't wait for Malicious Injection: The SQL.

      • Malicious squirrel injections? Dude, that's sick!
      • Re: (Score:3, Funny)

        by Dunbal ( 464142 )
        I can't wait for Malicious Injection: The SQL.

              Available soon on VHS, DVD and ODBC...
      • >>Yeah. Malicious Injection was a pretty good flick. I can't wait for Malicious Injection: The SQL.

        That has to be the funniest thing I have heard all day. I can just see that on a T-Shirt.

      • Not sure if its the fact that its past 2am and I've been browsing slashdot for hours, but that post made me laugh harder than anything in the Borat movie...
    • Have we lost our Sanity already? Any user input should be scrubbed sanitized and checked before using it for security and making sure it won't break your application because of the expected input.
      • Re: (Score:3, Insightful)

        by Dunbal ( 464142 )
        Any user input should be scrubbed sanitized and checked before using it

        This has been true since the dawn of programming. NEVER trust the user. Oh before it was just entering text when the program expected an integer, or a negative value when it expected a positive etc. Now we don't get "? Redo from start" errors that crash the BASIC programs. But it's essentially the same thing. Never expect the user will cooperate with the program. Especially a program that is available to potentially
        • by afidel ( 530433 )
          Yeah a LOT of that article read like CGI-101 from the mid 90's. Hell he even mentioned finger, a program most people who haven't been doing web stuff that long probably don't have a clue about.
      • Re: (Score:2, Troll)

        Oh c'mon and get real - good coding practices went out with C every since we learned we could blame the language instead of the application of it. You aren't trying to say this can affect all the latest languages as well? The mind boggles...

        /sarcasm
      • Any user input should be scrubbed sanitized and checked before using it

        This statement is almost always wrong. While there are occasionally cases where certain information simply cannot be represented in a particular (poorly-designed) system, most of the time you need to properly encode the data, rather than "checking" it for "dangerousness".

  • Old news (Score:4, Insightful)

    by kill-1 ( 36256 ) on Wednesday November 22, 2006 @02:54PM (#16954806)
    Shell scripts have been vulnerable to similar "injection" exploits since the invention of CGI.
    • More old news (Score:4, Insightful)

      by spellraiser ( 764337 ) on Wednesday November 22, 2006 @02:58PM (#16954908) Journal

      From TFA:

      The only real way to defend against all malicious code injection attacks is to validate every input from every user.

      Seems simple enough, but it's amazing how often this is ignored or implemented badly.

      • Re:More old news (Score:4, Informative)

        by Vihai ( 668734 ) on Wednesday November 22, 2006 @03:23PM (#16955374) Homepage
        The only real way to defend against all malicious code injection attacks is to validate every input from every user.
        Seems simple enough, but it's amazing how often this is ignored or implemented badly.

        ...but unfortunately it's mostly WRONG. In many cases, the real way to defend against injections is to ESCAPE values before composing strings, this is mostly the case with SQL (where prepared queries and the help of a good prepare/execute API is very much helpful) but it's not limited to it.

        If your parameter is a VALUE, it must remain a VALUE when you compose a command and proper escaping is the correct, reliable way.

        Validating input may be helpful as another layer of security, but it's not the "only right way", it's not even the *right* way (in most cases).

        • Re: (Score:1, Informative)

          by Anonymous Coward
          When your value is supposed to be an integer number, for example some itemnumber on the site, checking if it contains only digits (and maybe a minus sign) will not only protect you from runtime errors, it protects you against any possibility of injection at the same time.
          • Re: (Score:1, Informative)

            by Anonymous Coward
            That's just one example.

            Here's my tips for preventing SQL injection.
            1) Use stored procedures!!!!!!!
            2) escape your escape characters. i.e. in most statments a "'" is stored as "\'" so escape the \ so its stored as "\\'", it will invalidate the SQL statment because SQL will read it as "\'" instead of just "'"
            2.5) an alternate to escaping characters is to just strip characters unnecessary to be passed with your stored procedure. i.e. strip all quotes, strip all double quotes, strip all equals signs, bash sig
            • Re: (Score:1, Interesting)

              by Anonymous Coward
              IMHO checking what characters you want included in your values (e.g. only digits, only alphanumeric) is much better than trying to weed out characters from a list you can think of. There may be several ways to sneak in unwanted characters due to all the encoding methods being used.
            • Re: (Score:3, Informative)

              by J0nne ( 924579 )
              3) Do not send SQL parameters to your page in GET statements!!!!!! Either use session variables or POST statements, session variables are best.

              Using POST instead of GET doesn't make *any* difference. You can fake a POST request just as easily as a GET request. Please stop telling people that a POST is more secure...
            • 3) Do not send SQL parameters to your page in GET statements!!!!!! Either use session variables or POST statements, session variables are best.
              You know that POST's can be faked as easily as a GET, right? This hint is a classic example of security by obscurity.
            • Re:More old news (Score:4, Informative)

              by jrockway ( 229604 ) <jon-nospam@jrock.us> on Wednesday November 22, 2006 @05:23PM (#16957350) Homepage Journal
              > Here's my tips for preventing SQL injection.

              Here are mine that aren't garbage:

              > 1) Use stored procedures!!!!!!!

              "EXEC dbo.stored_procedure 'Oops'; DROP DATABASE foo; --'"

              > 2) escape your escape characters. i.e. in most statments a "'" is stored as "\'" so escape the \ so its stored as "\\'", it will invalidate the SQL statment because SQL will read it as "\'" instead of just "'"

              Not sure what you're talking about, but a literal apostrophe is quoted by doubling it in SQL. ' -> ''. However, don't quote -- you'll get it wrong. Use a proper mechanism instead, like prepared statements.

              > 2.5) an alternate to escaping characters is to just strip characters unnecessary to be passed with your stored procedure. i.e. strip all quotes, strip all double quotes, strip all equals signs, bash signs, etc.

              That's a great idea, until you need to store unicode or have a customer named "O'Reilly".

              > 3) Do not send SQL parameters to your page in GET statements!!!!!! Either use session variables or POST statements, session variables are best.

              Right, there's no way anyone can see hidden form fields! They're magical! (Also, session variables aren't "best". If you find the need to store SQL in a variable, your program is terribly designed and you need to rethink it. In this day and age of stored procedures and ORMs, you probably shouldn't have ANY SQL in your code.)

              4) You should be secure, but if your not comfortable doing that, then provide additional validation.

              Always validate -- it saves work later. If a user types 2-1234 as his phone number, and you store that, you won't be able to call him later, completely defeating the purpose of asking him for the data.

              If you're not sure that you can remember to validate everything, use a language that taints incoming data and kills the program when you use it. In perl, turning on taint mode will prevent the common pattern of:

              my $value = CGI->param('foo');
              $dbh->do("SELECT * FROM foo WHERE bar = $value");

              and even:

              $sth = $dbh->prepare('SELECT * FROM foo WHERE bar = ?');
              $sth->execute($value);

              Since you didn't validate $value, you can't use it (correctly or incorrectly).

              Hope this helps.
            • Dear AC,
              Since the dawn of time, there have been positional markers for SQL. SELECT * from bar where baz=? . This way, You not only allow the ' and \ and other characters to enter the DB unaltered (as they should!), but also You protect yourself from trivial SQL injection by not composing queries.
              However, people assume (the ass-You-Me), that once it's in SQL server, it is safe. Many stored procedures use dynamic queries (EXECUTE 'SELECT * from bar where baz='''||somevalue'''';) and do not do escaping (pg has

          • Using bound parameters, as the previous post suggested, is the correct way to mitigate SQL injection.
        • Mod this person up. He's absolutely correct. You don't clean your input, you just prepare it for how you intend on working with it.
        • Re: (Score:3, Informative)

          Wrong. For God's sake, you dweeby little junior programmers need to do some research before you open your damn mouths.

          Escaping values only brings up new vulnerabilities. In database servers these are known as SQL truncation, and are the byproduct of buffer overruns in system functions (such as QUOTENAME and PATINDEX in T-SQL). These truncation attacks affect even parameterized queries, and the ubiquitous sp_executesql system stored procedure. I won't go into the details. All the info you need is is BOL
          • by Vihai ( 668734 )

            Wrong. For God's sake, you dweeby little junior programmers need to do some research before you open your damn mouths.

            Oh please... if you really were a "senior programmer" you wouldn't do this kind of jokes, let alone of writing the stuff you wrote.

            Escaping values only brings up new vulnerabilities. In database servers these are known as SQL truncation

            A DBMS which silently truncates an SQL statement is simply buggy. The vulnerability is in the DBMS, not in the interface. If the SQL statements is b

        • I totally agree. While input validation will help you with numeric values, when Chloe O'Brian comes along, she does want her name to be properly stored
      • by Kjella ( 173770 )
        Well, the odds are just uneven. Imagine two equally bright guys can think of 50 exploits each of a total of 100. The chances of defending against that attack is 0.5^50 = none. Even if we assume one bright guy who'll think of 90 defenses and a stupid guy thinking of 10 attackes, you'll still only have a 0.9^10 = 35% chance of defending yourself. Good security means doing everything right all the time, something humans aren't particularly good at. Plus, it's not like most coders go into the war battle hardene
      • Re: (Score:2, Interesting)

        by Anonymous Coward
        WRONG! The solution is to NOT paste together "programs" (literal or figurative [i.e. SQL]) by combining your stuff and user's stuff!

        Forget making quotes illegal (the irish will thank you) and forget trying to second-guess every possible problem by escaping the all the stuff YOU are smart enough to forsee problems with (leaving holes for people smarter than you).

        Just ensure that your programs and user inputs never get mixed together. For example, use parameterized SQL. Or put user input into a file and
  • by Anonymous Coward on Wednesday November 22, 2006 @03:00PM (#16954960)
    ...is to replace database storage, xml, and ldap with comma-delimited text files on anonymous ftp. In fact, my last job fired me for gross incompetence because the other programmers were jealous of the simplicity of my solution.
  • know your system (Score:2, Insightful)

    by jeepee ( 607566 )
    "including LDAP injection and XPath injection. While these may not be as well-known to developers, they are already in the hands of hackers, and they should be of concern."

    How come they are not well known to developers. Last time I checked if I dont use ldap somewhere along my lines
    of codes I'm not in trouble of a ldap injection. Know your systems and check yours inputs! god damn!
    • Re: (Score:3, Insightful)

      by msobkow ( 48369 )

      Personally I have never understood why people try to hack utilities like XPath into database equivalents. But I guess if you learn how to use a hammer and screwdriver, you might well refuse to learn how to handle a wrench because you can "make" things work with the wrong tools.

      Or perhaps it's a negative side-effect of object reuse fanatics who don't consider that reusability does not necessarily mean eliminating alternate implementations, but enforcing an appropriately designed and narrowed interface in

  • XML Logic Is Flawed (Score:5, Informative)

    by CowboyBob500 ( 580695 ) on Wednesday November 22, 2006 @03:03PM (#16955036) Homepage
    In his XML example with XPath injection he states that running a certain query can return the entire order history of all customers. That may be true, but if the application is returning an XML document containing the entire order history of all customers for each customer request before running an XPath query, then I think the application has more problems than being vulnerable to XPath injection.

    Bob
  • Validate this (Score:4, Insightful)

    by gigne ( 990887 ) on Wednesday November 22, 2006 @03:05PM (#16955082) Homepage Journal
    FTA
    RE: validating input fields...
    To be completely thorough, a developer should set up both white- and blacklists in order to cover all bases.

    I can't help but feel that most developers have at least a little common sense and do something along those lines anyway.
    I often write little validate_input(char *string, char *format) that checks all input string from a user are simple, but more often than not very effective. How is this any different from using white and black lists. Any coder worth their salt would do something to stop malicious input, but no one in completely infallible.

    Security of anything in this world is near on impossible. Hackers will get around anything given time.
    • To be completely thorough, a developer should set up both white- and blacklists in order to cover all bases.
      I can't help but feel that most developers have at least a little common sense and do something along those lines anyway.

      Maybe most do, but there's been TONS of unvalidated input in programs since the dawn of time and there are no signs that will stop any time soon.

    • Re:Validate this (Score:5, Informative)

      by thsths ( 31372 ) on Wednesday November 22, 2006 @03:26PM (#16955452)
      >> To be completely thorough, a developer should set up both white- and blacklists in order to cover all bases.
      > I can't help but feel that most developers have at least a little common sense and do something along those lines anyway.

      I hope that most developers have the common sense to take the correct approach: avoid injection problems by proper quoting! There is no need to validate the data, you just have to make sure that it stays data when you parse it on. Just use the proper library functions, and you will be fine (especially if you use hex encoding :-)).

      White lists are a good idea if you don't trust you quoting, or if you need to verify the input for another reason. Black lists are most certainly not a good idea. Just imagine that the web shop tries to sell a product called "Selecta[tm]", but you block all attempts to buy it because it matches your black word "SELECT" :-(

      P.S.: Anybody with an apostrophe in their name naturally develops an unsatisfiable urge to kill web programmers.
      • by pe1chl ( 90186 )
        I hope that most developers have the common sense to take the correct approach: avoid injection problems by proper quoting

        And I would hope that developers (especially language developers) would realize that the really correct approach is not to glue SQL statements together from fixed strings and quoted arguments, but to use prepared statements with placeholders and arguments passed as a list.

        This is no problem with languages providing a full API to SQL, but in kludges like PHP it has been difficult for a lo
        • PHP has had a good API that includes support for prepared statements for a while now.

          http://www.php.net/pdo [php.net]
          • by joebp ( 528430 )
            Now consider why a language who's sole use is doing this sort of thing didn't have it from the start. The answer is that PHP was not designed with security in mind. It was designed to be easy to use.

            • The reason it didn't have it from the start is probably due to the same factors that led to nearly all of the major exploit classes... no one thought of the issue that resulted in the exploits. If we start way back in the beginning ("Smashing the Stack for Fun and Profit") there just wasn't much consideration given to the idea that data could result in malicious code execution.
            • by pe1chl ( 90186 )
              I think it wasn't designed. It was started as a toy project for a Personal Home Page.
        • by thsths ( 31372 )
          > And I would hope that developers (especially language developers) would realize that the really correct approach is not to glue SQL statements together from fixed strings and quoted arguments

          To be fair, the original article is about XPath and LDAP injection. As far as I know, there is no alternative to "brutal" string operations here. Around SQL you have a number of (not nice but) working data binding APIs, but for many new languages you do not have that (yet).

          Sometimes you have to use quoting, and you
      • by johneee ( 626549 )
        Which is exactly the problem I had in the past with a website I built using Typo3 (which is in general a reasonably good CMS)

        The client was having problems editing a certain record in the db, and after much investigation I discovered that any record that had the words "insert into" in it would make the submit form die completely. Annoying to say the least.

        I'll leave it to your imaginations as to what kind of web site would have the term "insert into" in news articles so as to leave my client's anonymity re
      • by daliman ( 626662 )
        So, so true.
    • I can't help but feel that most developers have at least a little common sense and do something along those lines anyway.

      If you do it with uncommon sense, though, it can go horribly wrong [thedailywtf.com]...


  • By the looks of the server, I would say DOS attacks are more common
  • by PHAEDRU5 ( 213667 ) <instascreedNO@SPAMgmail.com> on Wednesday November 22, 2006 @03:05PM (#16955092) Homepage
    I blame Microsoft for a lot of these vulnerabilities.

    I recently attended a Microsoft-sponsored seminar on web site security at the DeVry Institute in Decatur, GA.

    One of the speakers was a man from SPI Dynamics (sorry, forgot his name). He demonstrated how Microsoft's tools make it very easy to expose a database to the web, but how the same tools make exploiting the database very easy. He demonstrated an application that used SQL injection to first reverse-engineer the schema of an exposed database, and then the data in the database. It was quite a revelation.
    • Comment removed (Score:5, Insightful)

      by account_deleted ( 4530225 ) on Wednesday November 22, 2006 @03:30PM (#16955512)
      Comment removed based on user account deletion
      • by phorm ( 591458 )
        It think that it's a case of the tools themselves being made to simplify things, or to easily expose data, but often being overused or improperly used so that too much data is exposed, or it is exposed to the wrong people.
      • If you develop software that follows the usual layered model (web, business, persistence), you have code in place to isolate the web bit from the database bit. MS tools sort of shortcut the web/database bit, making it easier to exploit what's in the database.

        Hope this helps.
      • Re: (Score:3, Interesting)

        Um you can just as easily reverse engineer a mysql or postgresql database through sql injection attacks also. What's your point?

        Actually, you can't. There are several things about SQL-Server databases that makes buttfucking them particularly easy:

        • Very helpful error messages when attempting to cast strings to integers. This makes it quite easy to read all kinds of errors from the database by doing stuff such as select top 1 convert(int, name) from sysobjects ==> this will give you the name of first ta
    • As much as I would like to blame M$, Code Injection attacks have nothing to do with M$ or ANY operating system for that matter. It is the application developers' laziness to not validate input from external entity. Many attacks could be almost completely avoided with input validation including buffer overflow, cross-site scripting...

      --Ram
    • Re: (Score:3, Insightful)

      by ehrichweiss ( 706417 )
      Don't blame them on M$(though I would love to do so myself) they're actually not even the fault of XML or even SQL. Instead they're due to the programming language interface whether that is PHP, REXX, Perl, etc. Look carefully and you'll realize that the languages make it incredibly difficult to delimit certain variables that happen to be assigned things like quotation marks, etc. even with the usage of single and double quotes. For example variable1="this is the first line's message".variable2."and it's go
  • Never heard of the term "malicious injection". All these attacks would fall under the category of "Code Injection" and all code injection attacks could be prevented with diligent Input Validation. --Ram ------ "All problems in computer science can be solved by another level of indirection" -Butler Lampson
    • > All problems in computer science can be solved by another level of indirection" -Butler Lampson

      Except, of course, the problem of too many levels of indirection makeing either coding or running the code to slow.
      • Except, of course, the problem of too many levels of indirection makeing either coding or running the code to slow.

        But that's not a problem in computer science - it's a problem in software engineering. :P

  • by Sloppy ( 14984 ) on Wednesday November 22, 2006 @03:17PM (#16955276) Homepage Journal

    Heh, remember when we had binary file formats and protocols, fixed-length fields (didn't need delimiters), and there was no parsing or worrying about "escaping" data? We didn't have these problems.

    Anyway, I like this article because it admits that whitelists are better than blacklists. You have to validate data: make sure it is known to be non-harmful, rather than looking for whatever problems that you have imagined so far. You'll never guess all the things that can go wrong; you just know what is right.

    • Re: (Score:1, Insightful)

      by Anonymous Coward
      Heh, remember when we had binary file formats and protocols, fixed-length fields (didn't need delimiters), and there was no parsing or worrying about "escaping" data? We didn't have these problems.

      That's not exactly true. There are multiple ways to break parsers by entering bogus data even into fixed length fields. For example, there were several bugs in password and user configuration utilities that took advantage of the parser not correctly handling delimiters embedded in user input. Some even took advant
    • Heh, remember when we had binary file formats and protocols, fixed-length fields (didn't need delimiters), and there was no parsing or worrying about "escaping" data? We didn't have these problems.

      No kidding. I remember when everything in the world didn't need to be an "Application Framework" and code was fast and small and reliable and easy to fix.

    • Positive matching is much easier to code, test, and eliminate maliciousness. It's finite. This is a good thing.

      Negative matching is relatively infinite. Negative matching is why most spam filters can't stop spam reliably. Blacklists collapse under their own weight.

  • by miller60 ( 554835 ) on Wednesday November 22, 2006 @03:27PM (#16955458) Homepage
    Phishers have been known to use frame injections to insert their content into framesets, allowing them to grab login info from within the bank's own web site [netcraft.com]. It's not nearly as fancy as an SQL injection, but it's sure malicious and quite difficult for victims to recognize.
    • by Phrogman ( 80473 )
      Ah I hadn't thought of this (but then I don't Phish), do Mozilla or IE7 warn the user if they browse an SSL address through frames? If not then they should...
    • Phishers have been known to use frame injections to insert their content into framesets, allowing them to grab login info from within the bank's own web site [netcraft.com]. It's not nearly as fancy as an SQL injection, but it's sure malicious and quite difficult for victims to recognize.

      Quite difficult for victims to recognize, but easier for the bank to spot in their logfiles (... and fix, before the fraudsters can make much money from it)

  • by davidwr ( 791652 ) on Wednesday November 22, 2006 @03:28PM (#16955466) Homepage Journal
    "It's not just for breakfast anymore."
  • Ignorance (Score:1, Insightful)

    by Anonymous Coward
    I am really worried about the ignorance of the author (and many script writers, too). There is absolutely no need for validating user inputs, for black or white lists or whatever. The only correct solution of this problem is proper quoting/escaping. Most syntaxes (and this includes SQL, XML, XPath and LDAP) allow the quoting of otherwise significant characters in string literals. For SQL for example, simply double all single quotes in the string and use a pair of quotes around the string. That way, no attac
    • by pe1chl ( 90186 )
      I would call your second solution the only correct solution, and the first one a dangerous solution in the hands of the naive implementer.
      One should only attempt that when the language provides a quoting function like addslashes in php, so that you at least can leave the task of identifying the quotation marks to someone who knows a bit about thinks like UTF and other tricks to hide them.
    • Re: (Score:2, Interesting)

      by moco ( 222985 )
      Then your program needs to be aware of LDAP, SQL, XML and XPATH syntax. Validating user input, as in using regular expressions, will protect you from "FutureML" injection attacks without the need of knowing how "FutureML" will work. In my opinion validating user input IS the correct way of doing it.
    • Re:Ignorance (Score:4, Insightful)

      by bluebox_rob ( 948307 ) on Wednesday November 22, 2006 @04:24PM (#16956506)
      I think you're right - as long as you are sure that you know what's going to be done with the data after its been written away to your database. You might have your escaping/quoting routine solidly implemented for all inputs to your system, but the trainee down the hall who writes the reporting application that parses the table once a month might not be so savvy - the cunningly crafted SQL injection attack that your quoting has preserved and saved away into the db could wreak havoc when it gets read out again at the other end. The same goes for any HTML/XML that has been saved away, and then gets blindly written out by a web developer on the Order Summary page, or merged into some larger XML document without proper checks.

      I suppose an apt analogy would be saying that it's ok to allow infectious material into a building as long as it is first correctly sealed in a bio-safe container - well that's true as long as you're sure the janitor isn't going to open it up later that evening and use it for a cookie jar.
      • by Nurgled ( 63197 )

        So what would you propose as a solution to that? Not allowing any quotes in any strings?

        In the scenario you describe the fault clearly lies with the "trainee down the hall", and the fix should be to his code, not to the code that correctly inserted the data in the first place.

        Validation is important, but it's for ensuring data integrity not for security.

        • Sure, the trainee would get the blame for that one, but your system is still just as screwed regardless of whose fault it was. I don't think an idealised 'perfect world' (ie a world with no dumb trainees in it) vision of what a system should look like should stop you implementing a reasonable amount of security-in-depth. If there is no need to allow entry of particular characters in particular fields then why not explicity disallow it?
          • by Nurgled ( 63197 )

            Certainly you should constrain input to valid values, but if quotes are valid then it's not going to do you much good on its own. Validation of user input is primarily for data integrity, not security. Sometimes it helps with security by coincidence, but you can't rely on that.

    • The only correct solution of this problem is proper quoting/escaping.

      In the case of SQL, a much better solution is using bind variables. In addition to being totally invulnerable to injection attacks, they improve the efficiency of your queries (since the database engine can recognize when queries differ only in data, and cache its plan).
  • by DeadSea ( 69598 ) * on Wednesday November 22, 2006 @03:49PM (#16955910) Homepage Journal
    Another example of an injection attack allow an attacker to send spam through a contact form that doesn't normally allow the recipient to be specified by the user.

    A webmaster hosts a contact form on his website that allows users to fill out a form to contact him. He allows the user to specify a subject and a message but the recipient is hard coded to webmaster@example.com.

    The message ends up looking like this:

    To: webmaster@example.com
    From: thewebserver@example.com
    Subject: $subject

    $message
    Where $subject and $message are captured from the user on the website.

    If the $subject is not properly sanitized, a bot could submit it with a new line in it and be able to start a new line in the headers of the email. That new line could be, for example, a large CC list of people to spam with his message:

    Buy my weight loss pills!
    CC: spammee1@example.com, spammee2@example.com

    Which is why I would suggest using a contact form such as the one that I have written [ostermiller.org] that has already thought about this sort of thing.

    • by pe1chl ( 90186 )
      Of course when you code safety-first, you both will avoid the use of variables in the headers (i.e. do not make the subject variable) and the parsing of the headers by the MTA (i.e. give the destination address to sendmail instead of calling it with the -t flag and find the addresses from the headers).
    • Of course, this isn't a huge issue as most mail protocols don't actually route/deliver mail based on the headers. For example, in the SMTP and ESMTP protocols, there is no differentiation between a "To", "CC", and "BCC" addresses.

      Of course, it would make the email look ugly, but it wouldn't actually go to the spammed people.

  • by Jhan ( 542783 ) on Wednesday November 22, 2006 @04:09PM (#16956242) Homepage

    It's a simple matter of hygiene:

    Wash it before you eat it.

    All data read from external sources must be validated before being used. In some languages/frameworks this is as hard as nails (ie. I programmed a pretty large web application with only straight CGI programs written in pure Unix/C), in some you have help (Perl with taint), in some it's kinda-sorta-almost not an issue (PHP with Agavi and Creole).

    If I had to choose, I would have to say that the middle way, the Perl way, is the best. It does not pretend to solve all your problems for you, even when it can't really. Rather it brings the problems at hand to your attention. Problems surface, fix problems, code gets better.

  • FTA:
    > Many people mistakenly think that they are safe from malicious code injection attacks because they have firewalls or SSL encryption. ...
    > While establishing a list of "bad" input values that should be blocked (a blacklist) may seem like an appropriate first step, this approach is extremely limited.

    I laughed at these two sentences. Are there really people who need to be told this?
  • Did anyone else just get an image of a guy running around with a syringe laughing maniacally?
  • I wonder how many AJAX apps have "injection" problems? If developers aren't properly validating the inputs from xmlhttprequest on the server side there's potential for mischief.
  • Don't let your apps access your DB with global permissions.

    Obviously make sure data is scrubbed prior to putting it anywhere near a query, but make sure you have an account which can only read, an account which can only write/update tables, and a final one which can delete records in tables.

    The end result is that even if an ingenious user finds a way to get a DROP statement past your scrubbing, they won't be able to do anything useful in most cases since the account running the query only has permission to
  • Developers Developers Developers!
  • by CodeBuster ( 516420 ) on Wednesday November 22, 2006 @11:11PM (#16960948)
    It is well known amongst the more experienced software developers out there that all user input to ANY software system should be considered suspect and therefore must be checked for invalid inputs, boundary, and special cases. The solution has been around for decades, but it is really surprising how many developers out there have NOT heard of regular expressions or do not know how to properly use them. There are some cases, usually when widely variant free-form input is required, that are difficult to use with regular expresssions, but for the most part they have proven to be remarkably effective in my own experience and I use them regularly (pun intended) in my website and application development. If you have not gotten in on the regular expression game then consider picking up the O'Reilly Mastering Regular Expressions [amazon.com] book or visiting Regular-Expressions.info [regular-expressions.info] before building your next project. The project you save might be your own!
  • ``Malicious Injection It's Not Just For SQL Anymore''

    Malicious injection has never been just for SQL. Format string vulnerabilities (where format strings are passed into a program from untrustworthy sources), cross-site scripting vulnerabilities, and many other injection vulnerabilities have existed for a long time, probably longer than SQL injection vulnerabilities have.
  • ... I'm not quite satisfied with the preventative measures. While input validation helps reduce the number of input validation mistakes, disallowing all meta/control characters in input, may leave a pretty limited application. I would combine input validation with proper character escaping. For SQL, use prepared statements. LDAP, escape all meta characters (,|,* etc. For XML, escape Xpath meta characters.
  • by RAMMS+EIN ( 578166 ) on Thursday November 23, 2006 @04:22AM (#16962518) Homepage Journal
    There is a solution to injection vulnerabilities, but it's not validation. Sure, if you validate everything properly, you won't suffer from injection vulnerabilities. However, writing the code for that is cumbersome and error-prone, and thus, in practice, we see that values are not or not properly validated.

    The solution I've been championing is structured composition. Instead of verifying that the input won't alter the structure of whatever you're composing, you use APIs that ensure that this won't happen. Some examples of this, as well as other bug-eliminating language/library features, can be found in my essay Better Languages for Better Software [inglorion.net].
  • No matter what sort of input devide you use, does the following not seem to hold true:

    Lets say you are running a simple capture of FName,LName,Address,City,St,Zip, let each be an input to a PHP Script beased on a web form.

    Your SQl statement will consist of the following in the PHP Script:
    $Query = "insert into NewContact (Firstname,Lastname,Address,City,State,zip)";
    $Query .= "values($FName,$LName,$Address,$City,$State,$Zip)" ;

    Now scrubbed or unscrubbed how can this insert result in anything other the

    • by Nurgled ( 63197 )

      Precisely what you'd do to conduct an attack depends on your DB access API and the DBMS in use, but let's assume for a moment that we're using an API that allows us to have multiple queries in one call. This would be daft design, but it's true of many. Now imagine that your variable $Zip contains the following:

      "12345"); delete from NewContact; --

      This ends the insert query, which will presumably complete successfully, and then inserts a completely different query.

      Even if your API doesn't allow multiple

  • How I'd do stuff (Score:4, Informative)

    by TheLink ( 130905 ) on Thursday November 23, 2006 @04:47AM (#16962586) Journal
    So far everyone seems to be focusing on "input" and forgetting about "output", or even mixing the two.

    Anyway, my suggestion has always been to do something like the following:

    Inputs to your program
    |||
    Corresponding Input filters
    |||
    Your program
    |||
    Corresponding Output filters
    |||
    Outputs from your program
    |||
    Stuff receiving the outputs

    You have a different "input filter" for each class of input so that your program can handle those inputs correctly.

    Then you have a different output filter (e.g. SQL bind vars, HTML, XML) so that the stuff receiving your outputs (browser, database, viewer, etc) will handle them correctly.

    NEVER do stuff like magic quotes (PHP is one of the worst and most braindead language in popular use) - mixing input and output filtering is so wrong it isn't funny (there are so many other things PHP does wrong that it's almost criminal).

    Depending on the circumstances your program could output a single quote ' differently e.g. %27 for a cgi parameter, '' for Oracle data and \' for MySQL data (BTW MySQL is the PHP of databases). So it should be obvious that "one size fits all" doesn't work.

    By filtering I mean quoting/encoding sanity checking etc - whatever it takes to get the data in a suitable form (with hopefully minimal data loss/corruption).

One man's constant is another man's variable. -- A.J. Perlis

Working...