<?xml version="1.0" encoding="utf-8" ?>
<?xml-stylesheet type="text/xsl" href="RSS_xslt_style.asp" version="1.0" ?>
<rss version="2.0" xmlns:WebWizForums="https://syndication.webwiz.net/rss_namespace/">
 <channel>
  <title>Web Wiz Support and Community Forums : SQL Injecti&#111;ns?</title>
  <link>https://forums.webwiz.net/</link>
  <description><![CDATA[This is an XML content feed of; Web Wiz Support and Community Forums : Web Wiz Forums : SQL Injecti&#111;ns?]]></description>
  <copyright>Copyright (c) 2006-2013 Web Wiz Forums - All Rights Reserved.</copyright>
  <pubDate>Mon, 13 Apr 2026 15:20:14 +0000</pubDate>
  <lastBuildDate>Tue, 26 Jul 2005 14:05:15 +0000</lastBuildDate>
  <docs>http://blogs.law.harvard.edu/tech/rss</docs>
  <generator>Web Wiz Forums 12.08</generator>
  <ttl>360</ttl>
  <WebWizForums:feedURL>https://forums.webwiz.net/RSS_post_feed.asp?TID=15660</WebWizForums:feedURL>
  <image>
   <title><![CDATA[Web Wiz Support and Community Forums]]></title>
   <url>https://forums.webwiz.net/forum_images/web_wiz_forums.png</url>
   <link>https://forums.webwiz.net/</link>
  </image>
  <item>
   <title><![CDATA[SQL Injecti&#111;ns? : WWF does seem to be well secured...]]></title>
   <link>https://forums.webwiz.net/sql-injections_topic15660_post87727.html#87727</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forums.webwiz.net/member_profile.asp?PF=19649">JJLatWebWiz</a><br /><strong>Subject:</strong> 15660<br /><strong>Posted:</strong> 26&nbsp;July&nbsp;2005 at 2:05pm<br /><br />WWF does seem to be well secured against SQL Injection exploits.&nbsp; I haven't gone through every last input field to make sure it uses the formatInput and formatSQLInput function, but coverage seems comprehensive.&nbsp; Here is a good introduction to SQL Injection attacks with some good examples to test: <A href="http://www.unixwiz.net/techtips/sql-injecti&#111;n.html" target="_blank">http://www.unixwiz.net/techtips/sql-injection.html<DIV></DIV><DIV></DIV><DIV></DIV></A><DIV></DIV><DIV></DIV><DIV>&nbsp;</DIV><DIV>One area of vulnerability in WWF compared to the examples in the site above is that an attacker can easily acquire the entire source code and can know with near absolute certainty the name of every table and field.</DIV><DIV>&nbsp;</DIV><DIV>Even if WWF were wide open to&nbsp;SQL Injection exploits, using SQL Injection alone, an attacker could not acquire a user password in order to act as that user.&nbsp; Using SQL Injection and still assuming WWF were vulnerable, an attacker could change the user email address and then reset the password in order to act as that user after the reset.&nbsp;&nbsp;Obviously the legitimate user could no longer log in with the old password and the email address would be a telltail sign of the attack.</DIV><DIV>&nbsp;</DIV><DIV>&nbsp;</DIV>]]>
   </description>
   <pubDate>Tue, 26 Jul 2005 14:05:15 +0000</pubDate>
   <guid isPermaLink="true">https://forums.webwiz.net/sql-injections_topic15660_post87727.html#87727</guid>
  </item> 
  <item>
   <title><![CDATA[SQL Injecti&#111;ns? : He said something like &amp;#034;find...]]></title>
   <link>https://forums.webwiz.net/sql-injections_topic15660_post86381.html#86381</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forums.webwiz.net/member_profile.asp?PF=19076">UnderWarrior</a><br /><strong>Subject:</strong> 15660<br /><strong>Posted:</strong> 04&nbsp;July&nbsp;2005 at 5:17am<br /><br />He said something like "find yourself, i won't tell". guess you're right]]>
   </description>
   <pubDate>Mon, 04 Jul 2005 05:17:51 +0000</pubDate>
   <guid isPermaLink="true">https://forums.webwiz.net/sql-injections_topic15660_post86381.html#86381</guid>
  </item> 
  <item>
   <title><![CDATA[SQL Injecti&#111;ns? : Have him e-mail you exactly what...]]></title>
   <link>https://forums.webwiz.net/sql-injections_topic15660_post86357.html#86357</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forums.webwiz.net/member_profile.asp?PF=12115">wistex</a><br /><strong>Subject:</strong> 15660<br /><strong>Posted:</strong> 03&nbsp;July&nbsp;2005 at 8:39pm<br /><br />Have him e-mail you exactly what he did.&nbsp; I bet he won't.&nbsp; He's probably bluffing since he probably did what Borg suggested instead.]]>
   </description>
   <pubDate>Sun, 03 Jul 2005 20:39:42 +0000</pubDate>
   <guid isPermaLink="true">https://forums.webwiz.net/sql-injections_topic15660_post86357.html#86357</guid>
  </item> 
  <item>
   <title><![CDATA[SQL Injecti&#111;ns? : WWF is good at detecting SQL injection....]]></title>
   <link>https://forums.webwiz.net/sql-injections_topic15660_post86356.html#86356</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forums.webwiz.net/member_profile.asp?PF=12115">wistex</a><br /><strong>Subject:</strong> 15660<br /><strong>Posted:</strong> 03&nbsp;July&nbsp;2005 at 8:38pm<br /><br />WWF is good at detecting SQL injection.&nbsp; I've had WWF tested by a friend of mine and he couldn't get in using that trick.<DIV>&nbsp;</DIV><DIV>WWF's security is so good, that I use&nbsp;it to power the login for my entire website.&nbsp; Any other scripts I install, I modify to use WWF to handle members and login/logout.&nbsp; Some of the other scripts I have purchased or downloaded from other people were vulnerable to that kind of attack, so modifying it to use WWF's member management made those scripts secure.</DIV>]]>
   </description>
   <pubDate>Sun, 03 Jul 2005 20:38:11 +0000</pubDate>
   <guid isPermaLink="true">https://forums.webwiz.net/sql-injections_topic15660_post86356.html#86356</guid>
  </item> 
  <item>
   <title><![CDATA[SQL Injecti&#111;ns? : All input is carefully screened...]]></title>
   <link>https://forums.webwiz.net/sql-injections_topic15660_post86056.html#86056</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forums.webwiz.net/member_profile.asp?PF=1">WebWiz-Bruce</a><br /><strong>Subject:</strong> 15660<br /><strong>Posted:</strong> 29&nbsp;June&nbsp;2005 at 11:35am<br /><br />All input is carefully screened using specially created filters ,functions, etc. (over 3 months full-time work and 500 hours where spenton these filters and other security protection) to prevent any type ofSQL injection.<br><br>Usually if someone gets in as another users it is becuase they haveused an easy to guess password, or they used a shared computer and usedthe auto-login feature.<br>]]>
   </description>
   <pubDate>Wed, 29 Jun 2005 11:35:50 +0000</pubDate>
   <guid isPermaLink="true">https://forums.webwiz.net/sql-injections_topic15660_post86056.html#86056</guid>
  </item> 
  <item>
   <title><![CDATA[SQL Injecti&#111;ns? : one person took control on other...]]></title>
   <link>https://forums.webwiz.net/sql-injections_topic15660_post86054.html#86054</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forums.webwiz.net/member_profile.asp?PF=19076">UnderWarrior</a><br /><strong>Subject:</strong> 15660<br /><strong>Posted:</strong> 29&nbsp;June&nbsp;2005 at 10:54am<br /><br />one person took control on other user in my forum, and he said he done that using sql injection in the forum.<br><br>Is there any such known vuln' for version 7.91?<br>]]>
   </description>
   <pubDate>Wed, 29 Jun 2005 10:54:17 +0000</pubDate>
   <guid isPermaLink="true">https://forums.webwiz.net/sql-injections_topic15660_post86054.html#86054</guid>
  </item> 
 </channel>
</rss>