Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:04 PM
John H. Sawyer
John H. Sawyer

Attacking Customers, Employees With SQL Injection

In the security world, providing "what-if" scenarios can be good, but real-world examples are often required to get people to sit up and listen.

In the security world, providing "what-if" scenarios can be good, but real-world examples are often required to get people to sit up and listen.For example, in my last Tech Insight, "SQL Injection Demystified," I covered some of the dangers of SQL injection and what an attacker could do if he were able to successfully exploit it. Yesterday, one of those examples caught my attention, "Yahoo! Local Hacked: Vulnerable to SQL Injection."

A "grey hat" hacker, Unu, discovered a SQL injection vulnerability in Yahoo! Local Neighbors that allowed him (or her) to do practically anything -- from viewing user information from the database to reading files on the local database server, including the /etc/passwd file. There are screenshots and some more details included in the hacker's blog.

In my Tech Insight article, I touched on several of the exploit capabilities, but as one reader pointed out, it can go much, much deeper as seen with the Heartland attacks. Through SQL injection, attackers were able to gain access to the local database server, pivot to attack other important servers, and install malware with keylogging and network sniffing capabilities. It's an incredibly powerful vector for attack, and one that I've had developers dismiss by saying it's only an error message, and you can't do anything with that.

Even if an attacker can't get enough privileges to start executing code and making changes on the local database server's system, rights to edit content within the database can be just as powerful. Imagine that an attacker starts editing your Web content to include hidden iFrames with an exploit for the latest ActiveX or Flash vulnerability. Or say he uses Browser Rider or BeEF to inject a JavaScript hook to hijack Web browsers of people viewing your site. From there, he just needs to compromise the right credentials, and he's in.

A very good Webcast that covers scenarios like SQL injection being used to hijack Web browsers is the "Invasion of the Browser Snatchers: Part I," featuring Ed Skoudis and Kevin Johnson of InGuardians. The Webcast is about an hour long. Ed and Kevin both do a very good job of explaining how SQL injection attacks work and just how much evil can be wrought.

John H. Sawyer is a senior security engineer on the IT Security Team at the University of Florida. The views and opinions expressed in this blog are his own and do not represent the views and opinions of the UF IT Security Team or the University of Florida. When John's not fighting flaming, malware-infested machines or performing autopsies on blitzed boxes, he can usually be found hanging with his family, bouncing a baby on one knee and balancing a laptop on the other. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-17
In CiviCRM before 5.21.3 and 5.22.x through 5.24.x before 5.24.3, users may be able to upload and execute a crafted PHAR archive.
PUBLISHED: 2021-06-17
In CiviCRM before 5.28.1 and CiviCRM ESR before 5.27.5 ESR, the CKEditor configuration form allows CSRF.
PUBLISHED: 2021-06-17
HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge networking mode allows ARP spoofing from other bridged tasks on the same node. Fixed in 0.12.12, 1.0.5, and 1.1.0 RC1.
PUBLISHED: 2021-06-17
An XSS issue was discovered in manage_custom_field_edit_page.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field.
PUBLISHED: 2021-06-17
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.