> Because the query may be called with the cachedwithin 
> attribute which doesn't play nice with queryparams. I haven't 
> seen a easy work around for this issue yet. 

You can cache your query within the Session, Application or Server scopes,
or you might be able to cache a query of that query using
CACHEDWITHIN/CACHEDAFTER.

> But if im not mistaken(easily could be) someone might not 
> need to be able to stuff in single quotes to tamper? I think 
> they need the semi colon and parens to insert a sub query to 
> blow something up
> 
> ;(drop table users) or something of the sort?

There are all sorts of things you might do within an SQL injection attack,
some of which are database-specific. For example, on MS SQL Server, you
might try to open a shell using xp_cmdshell.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized 
instruction at our training centers in Washington DC, Atlanta, 
Chicago, Baltimore, Northern Virginia, or on-site at your location. 
Visit http://training.figleaf.com/ for more information!


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:192601
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to