Not sure if you’re using strong parameters or not, but this is an interesting approach: https://github.com/zendesk/stronger_parameters. Anyone out there using it?
Rob — Sent from Mailbox On Thu, Mar 12, 2015 at 9:35 AM, Rob Kaufman <[email protected]> wrote: > On the plus side, other than throwing an exception at least the injection > attach is blocked > Rob > — > Sent from Mailbox > On Thu, Mar 12, 2015 at 9:23 AM, Chris McCann <[email protected]> > wrote: >> One of my apps uses will_paginate and I received several exception >> notifications overnight that indicate someone tried a SQL injection attack >> against the app using the :page parameter. How should I handle this? >> The route they tried: >> ...events/upcoming?page=convert%28int%2Cdb_name%28%29%29%20and%201%3D1 >> The resulting error: >> A WillPaginate::InvalidPage occurred in events#upcoming: >> "convert(int,db_name()) and 1=1" given as value, which translates to '0' >> as page number >> /var/www/rails/apollo_production/shared/bundle/ruby/ >> 1.8/gems/will_paginate-2.3.16/lib/will_paginate/collection.rb:27:in >> `validate' >> Disregading than the general irritation this creates (how dare someone try >> to SQL inject my app!), what's the right way to detect and handle this? >> Cheers, >> Chris >> -- >> -- >> SD Ruby mailing list >> [email protected] >> http://groups.google.com/group/sdruby >> --- >> You received this message because you are subscribed to the Google Groups >> "SD Ruby" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to [email protected]. >> For more options, visit https://groups.google.com/d/optout. -- -- SD Ruby mailing list [email protected] http://groups.google.com/group/sdruby --- You received this message because you are subscribed to the Google Groups "SD Ruby" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
