Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security //

Database Security

11/15/2013
07:10 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Finding SQL Injection Attacks In Unexpected Quarters

Injection by Google bot and through modern mobile and Web apps will require adjustments

SQL injection attacks have been plaguing the Web for so long that it may seem as if they've grown ho-hum. But even while the fundamentals stay the same -- namely, malforming application input to trick databases into thinking they've been queried with SQL statements -- new Web and mobile application development trends and new attack techniques using old SQL injection tricks are casting SQLi in a new light.

For example, researchers with Sucuri Security early this month announced they discovered how attackers were able to leverage Google search engine bots to help launch SQLi attacks against websites.

"In this scenario, the bot was crawling Site A. Site A had a number of links embedded that had the SQLi requests to the target site, Site B," wrote Daniel Cid, a researcher with the firm. "Google Bot then went about its business crawling pages and following links like a good boy, and in the process followed the links on Site A to Site B, and began to inadvertently attack Site B."

[How do you know if you've been breached? See Top 15 Indicators of Compromise.]

As Cid explains, this method allows the attacker to let the Google bot do the heavy lifting in the attack while providing a way to cover tracks forensically and avoid Web application firewall detection.

While the Google bot technique is a more exotic example of how SQLi attacks have changed without many shifts in the underlying technology principles behind them, IT could be dealing with thornier but workaday changes in the SQL injection vulnerability landscape very soon. The shift will come as more SQLi vulnerabilities are exploited in unexpected mobile and Web applications, says Dan Kuykendall, co-CEO and CTO of NTO Objectives. These are developed using new programming formats and development frameworks, such as JSON, AMF, and REST, that don't necessarily depend on the name-value pair data representation that SQLi attacks tend to target for injection.

"The world has been changing -- there are a whole bunch of new formats that we've seen traffic being sent in. There are all these new ways of building apps, you've got all this REST, you've got AJAX, and you've got these much more dynamic apps, mobile apps," Kuykendall says. "And they've all got much more different ways of packaging up the data. They don't like to settle for the name-value pairs of the past."

While it would be easy to then assume these new applications are, as a result, not vulnerable to SQLi attacks, the truth is different, Kuykendall explains. These applications -- whether mobile or Web -- are still passing large amounts of data between the application and the database, and are still vulnerable to injection as long as attackers take a little time to understand how the syntax has changed.

"I can still do my classic SQL injection attacks. I just have to start adjusting where I apply the payloads," he says. "I no longer am able to put in the name-value pair. Instead I'm having to look and understand the format, understand how to inject into that, and then I can still do my SQL attacks."

The difficulty is because the format of how these SQLi payloads are delivered looks differently in modern applications, many traditional application scanners are missing the vulnerabilities. But as he puts it, developers are still making the same core mistakes they always have.

"They're passing data back and forth; they're taking that data and doing the same things they've always done with them and use them in SQL statements. A lot of times because they're getting the data from some parser, then the developer uses the data, and they trust the client," Kuykendall says. "Ultimately, these are just parameters; developers are taking values form the client and doing something with that. And the more it's abstracted, the more likely they miss out on doing the input escaping or whatever they need to do [to prevent injection]."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
notsosecure
50%
50%
notsosecure,
User Rank: Apprentice
11/15/2013 | 1:03:28 PM
re: Finding SQL Injection Attacks In Unexpected Quarters
Master the Art of Exploiting Injection Flaws in the SQLi Lab:

http://www.securitytube-traini...

4 databases, 29 challenges, 90+ objectives, 1.5GB of Video solution, unlimited fun!
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8344
PUBLISHED: 2020-09-24
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2020-8347
PUBLISHED: 2020-09-24
A reflective cross-site scripting (XSS) vulnerability was reported in Lenovo Enterprise Network Disk prior to version 6.1 patch 6 hotfix 4 that could allow execution of code in an authenticated user's browser if a crafted url is visited, possibly through phishing.
CVE-2020-8348
PUBLISHED: 2020-09-24
A DOM-based cross-site scripting (XSS) vulnerability was reported in Lenovo Enterprise Network Disk prior to version 6.1 patch 6 hotfix 4 that could allow execution of code in an authenticated user's current browser session if a crafted url is visited, possibly through phishing.
CVE-2020-15850
PUBLISHED: 2020-09-24
Insecure permissions in Nakivo Backup & Replication Director version 9.4.0.r43656 on Linux allow local users to access the Nakivo Director web interface and gain root privileges. This occurs because the database containing the users of the web application and the password-recovery secret value i...
CVE-2020-15851
PUBLISHED: 2020-09-24
Lack of access control in Nakivo Backup & Replication Transporter version 9.4.0.r43656 allows remote users to access unencrypted backup repositories and the Nakivo Controller configuration via a network accessible transporter service. It is also possible to create or delete backup repositories.