 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 288
Members: 0
Total: 288
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
MSSQL now uninjectable? |
 |
Posted: Tue Jan 24, 2006 3:13 pm |
|
|
piglet |
Regular user |

 |
|
Joined: Jan 17, 2006 |
Posts: 10 |
|
|
|
 |
 |
 |
|
I've been messing with SQL lately & have noticed that all the MSSQL sites seem to have SQL locked down tight. They take only 1 imput field & no outpuf fields. All I can get is.
I put this in:
display.asp?category=14'
I get this back:
Microsoft VBScript runtime error '800a000d'
Type mismatch: '[string: "14'"]'
/display.asp, line 14
I've tried all the listed xp command-shell stuff, it doesn't matter what I put in. Only =1 to =14 gives me the page. Am I on a highway to nothing here, or what? The only exception is if I do something like =99999999999999999999999999 then I get:
Microsoft OLE DB Provider for SQL Server error '80040e57'
Arithmetic overflow error converting numeric to data type int.
/display.asp, line 26
So, what have I learnt? Well, it converts the input string into an int. Any int value bigger than the record size gives me:
ADODB.Recordset error '800a0bcd'
Either BOF or EOF is True, or the current record has been deleted. Requested operation requires a current record.
/display.asp, line 84
So, it looks pretty secure from here.
My next attempt was to use fractions. I tried 14.1 to 14.5 & it just brought up the expected page. However, when I tried 14.6 it brought up the page, but with a little extra. At the top of the page, it said:
This catagory has not yet been activated (it was a graphic, not text).
Then I thought I would try =14.999999999999999999999999999999 which brought up yet another, useless error:
Microsoft OLE DB Provider for SQL Server error '80040e57'
The number '14.999999999999999999999999999999' is out of the range for numeric representation (maximum precision 2 .
/display.asp, line 26
So, with only 1 imput possible, I think I've tested all the alternatives. Anybody out there with any further ideas? |
|
|
|
|
 |
 |
|
 |
Posted: Tue Jan 24, 2006 3:56 pm |
|
|
piglet |
Regular user |

 |
|
Joined: Jan 17, 2006 |
Posts: 10 |
|
|
|
 |
 |
 |
|
I'm also looking into the email addresses connected to the site. Is there any way other than brute-force to get the list of mailboxes connected to a server? |
|
|
|
|
 |
 |
|
 |
Posted: Thu Jan 26, 2006 3:15 pm |
|
|
piglet |
Regular user |

 |
|
Joined: Jan 17, 2006 |
Posts: 10 |
|
|
|
 |
 |
 |
|
The only place on the site I can find to inject possibly 'interesting' data is into the order-form in checkout.asp. The form POSTs order details to hidden.asp. There are quite a number of fields. Look:
First Name:
Last Name:
Street Address:
City:
ZIP / Area Code:
State:
Country:
Email Address:
Telephone:
Additional Info:
Shipping Information:
Shipping Name:
Shipping Method:
Payment Information:
Payment Method:
Now, some of these fields are characters, some are numerical, some are a mixture.
The MOST interesting bit gleaned from the HTML is this:
<INPUT TYPE="hidden" NAME="finalTotal" VALUE="24">
<INPUT TYPE="hidden" NAME="orderTotal" VALUE="0">
<input type="hidden" name="subtotal" value="">
<input type="hidden" name="shippingCost" value="$24.00">
<INPUT TYPE="hidden" NAME="printShipment" VALUE="Regular">
<input type=hidden name=discount value="None">
Note the 'discount value' field. I'm not at all familiar with ASP, but I would love to know IF I can manipulate that 'discount value' field & if so, how do I format the POST command? What I really need is something that let's me edit the form before submitting it. Surely someone knows of such a utility/Firefox add-on? |
|
|
|
|
 |
 |
|
 |
Posted: Fri Jan 27, 2006 2:49 pm |
|
|
piglet |
Regular user |

 |
|
Joined: Jan 17, 2006 |
Posts: 10 |
|
|
|
 |
 |
 |
|
I've found the appropriate utility to modify hidden fields with Firefox. A useful user script called 'form help' which allows one to twiddle with all the values in hidden fields. I'm wondering if anyone can suggest ways to 'break it's brain' by disabling the javascript field-checkers & entering some massive values  |
|
|
|
|
Posted: Fri Jan 27, 2006 3:57 pm |
|
|
piglet |
Regular user |

 |
|
Joined: Jan 17, 2006 |
Posts: 10 |
|
|
|
 |
 |
 |
|
Well, I applied the discound and was told that I owed the grand total of $0.00. Of course, I mailed them and told them about the weakness so that's 1 less hole. Hidden fields for discounts cannot be unique, so get looking for them, people! |
|
|
|
|
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|