sorry, i overlooked that this IS a mysql mailing-list and we are
running ms-sql in this particular case. good catch...
I'd appreciate any insight though.

On Mon, Feb 13, 2012 at 1:56 PM, Gary Smith <shady...@l33t-d00d.co.uk> wrote:
> On 13/02/2012 21:48, Haluk Karamete wrote:
>>
>> My logs shows that we have tried with a  SQL Injection attempt, but
>> our engine has detected and avoided it but I am just curious, what are
>> these SQL statements are intending to achieve?
>>
>>  SELECT * FROM lecturer WHERE recID='25 ' and exists (select * from
>> sysobjects) and ''='' ORDER BY EntryDate DESC
>>
>> and
>>
>> SELECT * FROM lecturer WHERE recID='25' and char(124)+user+char(124)=0
>> and '%'='' ORDER BY EntryDate DESC
>>
>> If these were let in, what would have happened?
>>
> Nothing on MySQL - however, if the back end was an MS SQL server then the
> first query would prove that the user had access to the sysobjects table (ie
> wasn't constrained within a view, etc).
>
> The second is - the char(124) evaluates to |user|=0. I'm not sure what this
> one does, tbh.
>
> Gary

--
MySQL General Mailing List
For list archives: http://lists.mysql.com/mysql
To unsubscribe:    http://lists.mysql.com/mysql

Reply via email to