On the plus side, other than throwing an exception at least the injection 
attach is blocked




Rob


—
Sent from Mailbox

On Thu, Mar 12, 2015 at 9:23 AM, Chris McCann <[email protected]>
wrote:

> One of my apps uses will_paginate and I received several exception 
> notifications overnight that indicate someone tried a SQL injection attack 
> against the app using the :page parameter.  How should I handle this?
> The route they tried:
> ...events/upcoming?page=convert%28int%2Cdb_name%28%29%29%20and%201%3D1
> The resulting error:
> A WillPaginate::InvalidPage occurred in events#upcoming:
>  "convert(int,db_name()) and 1=1" given as value, which translates to '0' 
> as page number
>   /var/www/rails/apollo_production/shared/bundle/ruby/
> 1.8/gems/will_paginate-2.3.16/lib/will_paginate/collection.rb:27:in 
> `validate'
> Disregading than the general irritation this creates (how dare someone try 
> to SQL inject my app!), what's the right way to detect and handle this?
> Cheers,
> Chris
> -- 
> -- 
> SD Ruby mailing list
> [email protected]
> http://groups.google.com/group/sdruby
> --- 
> You received this message because you are subscribed to the Google Groups "SD 
> Ruby" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to [email protected].
> For more options, visit https://groups.google.com/d/optout.

-- 
-- 
SD Ruby mailing list
[email protected]
http://groups.google.com/group/sdruby
--- 
You received this message because you are subscribed to the Google Groups "SD 
Ruby" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to