Risk
9/14/2009
09:29 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

SQL Vulnerabilities Continue To Plague Web Security

A gray-hat hacker with a reputation for outing corporate Web site vulnerabilities says he's uncovered SQL injection flaws in the Web site of RBS WorldPay. RBS responded, saying no customer data was accessed.

A gray-hat hacker with a reputation for outing corporate Web site vulnerabilities says he's uncovered SQL injection flaws in the Web site of RBS WorldPay. RBS responded, saying no customer data was accessed.SQL injection attacks remain one of the most prominent forms of attacks levied against Web sites and databases. Essentially, attackers place junk or maliciously crafted input into Web page or application forms and if that input isn't vetted properly by the application or database -- the server may attempt to execute that command. From there, all types of nasty things can happen. The database can crash, cough up information they shouldn't, or even give the attacker complete reign over the server.

These types of problems are avoidable. While developers will always make mistakes, and SQL injection vulnerabilities won't reach extinction soon: their numbers can be reduced significantly. Applications just need be created properly, and in a way that vets user inputs and rejects obviously bogus field inputs and database requests.

A lot of companies, apparently, don't think it's worth the trouble. Some of the most notorious hacks and cyber-crimes have involved SQL injection attacks including Heartland and Hannaford. According to a report issued by WhiteHat security Inc., which evaluated the security of 1,031 sites, about 17% of Web sites were vulnerable to SQL injection attacks.

That's why it was no surprise when I read Kelly Jackson Higgins' DarkReading headline Hacker Hits RBS WorldPay Systems Database, to learn SQL injection was central to the incident:

The hacker, who goes by "Unu," says he accessed RBS WorldPay's database via a SQL injection flaw in one of its Web applications. RBS WorldPay maintains Unu accessed a test database that didn't carry any live data, and that no merchant or cardholder data accounts were compromised. The company has since taken down the pages.

[ . . . ]

"If the parameter is not well-secured, besides the legitimate request from the database -- which is related to that parameter -- other applications data can insert," he says. "The vulnerable parameter allows full access to databases on [the] server."

In addition to the SQL injection vulnerabilities, Unu also noted weak password usage on the site, including clear text publishing of an administrative password.

You can take a look at the screenshots Unu says are taken of the hacked RBS WorldPay database.

Earlier this year, the SANS Institute published a list of the top 25 security-related mistakes developers make. The list is based on a consensus gathered by 30 U.S. and international security organizations, including US-CERT, the NSA and several security vendors. SQL injection made the list. Let's hope organizations start to wise up, and stop making the same mistakes over and over again.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.