Witango-Talk: Network outages @ witango.com Friday 24th Sept AEST

2004-09-22 Thread Phil Wade
Hi,
On Friday 24th Sept (in Australia), between 10am and 5pm AEST (Thursday 5pm
and 12am PST) we will be doing some network maintenance and upgrades.

During this upgrade window there will be times where our web, witango-talk
and email will be unavailable.  This is part of the upgrade.  These services
will return and be accessible shortly thereafter.

If you do have an emergency (an unforeseen combination of circumstances or
the resulting state that calls for immediate action) we will still be able
to be contacted on that antiquated technology called the telephone.


Phone:  +61 2 9460 0500
Fax  :  +61 2 9460 0502


Do not panic or be alarmed we are only upgrading our network infrastructure.
A few hours without witango-talk will do you good.  ;)


Regards

Phil


TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


Re: Witango-Talk: Security question

2004-09-22 Thread Sri Amudhanar




Ooops!
Just noticed a bug in my  test value syntax. Make that %'; (percent + single-quote
+ semicolon) since % is the SQL wild card for column values in most databases
(except Access). Similarly choose the line terminator applicable for your
Database SQL syntax (# in some cases), and/or programming language (semicolon,
 etc.).
Sri

Sri Amudhanar wrote:

  
   Since you provide your own SQL in a DirectDBMS action, you are responsible 
for its quality, so like Gauthier suggests, use stored procedures/parametized 
queries.
 Sri Amudhanar
 Maxys Corporation
 Authorized Witango Reseller
 Authorized Pervasive, Cisco, HP, Thawte Reseller.
 
 Roland Dumas wrote:
 
  
Re: Witango-Talk: Security question
I’m slow here. Does this mean that if there is a
SQL query in a DirectDBMS Action that it’s protected by this bind dust? Or
just New Record and Update Actions?
  
  
  On 9/22/04 11:34 AM, "Sri Amudhanar" <[EMAIL PROTECTED]> wrote:
  
 
One of the lesser talked about features of Witango/Tango 
server architecture is the advantage of "actions", especially the database 
actions. According to what I have gleaned over the years (since I don't work 
for Pervasive or Witango, and I don't have access to the Server source code), 
the database action appears to "PREPARE" SQL and then "BIND" values to it 
on the fly, before actually executing the statement. This way quotes and other
SQL breaking characters in the field values are prevented from breaking the
query. If you attempt to assemble your own SQL query for use in Witango/Tango, 
PHP (which has no equivalent of a database action), or a Java application 
etc, SQL hacking is a serious problem that will need to be addressed. Witango/Tango 
<@BIND **> tags provide a great service here.
  For one answer to the question,  create a TAF that is used for login, (i.e. 
searching on userid AND password) and enter the values for userid and password 
as  *';  (star + single-quote + semicolon). If you query breaks the program 
logic, you have a problem. If it doesn't, your system is innoculated against 
this kind of SQL injection attack, at least.
  As they say, have fun!
  Sri Amudhanar
  Maxys Corporation
  
  
  [EMAIL PROTECTED] wrote:
   
   
  Hello,
  
  this issue is known as "SQL injection" problem, search on google for more
  information.
  
  You should use stored proc (if available) or parametized queries, and also
  rely on argument checking (B) to avoid completely this security issue.
  
  Hope this helps.
  
  Gauthier
  
  - Original Message -
  From: "Roland Dumas" <[EMAIL PROTECTED]>  
  
  To: <[EMAIL PROTECTED]>
 
  
  Sent: Wednesday, September 22, 2004 5:52 PM
  Subject: Re: Witango-Talk: Security question
  
  
    
   
 
 
  I want the SHORT answer, something like:
  
  A.) If you use witango, a browser-sumitted piece of coding can't affect
  
   
  

  the
    
   
 
 
  database, witango, or a visitor who searches and gets the record with the
  code.
  B.) Holy s**t!: You're an idiot of you doing have a layer in front of a
  submit that searches and kills anything that looks like this.
  C.) It is theoretically possible to submit harmful code that might do
  this.
  
  If someone put some SQL in a text field, for instance, what might happen
  
   
  

  to
    
   
 
 
  it down the line?
  
  On a prior project, there was a unix head who thought he could break a
  witango app by submitting all kinds of junk. He tried and tried and
  
   
  

  failed.
    
   
 
 
  He put in SQL, unix commands, and all kinds of noise, but all it did was
  store it and show it back to him when he queried.  Is that my answer?
  
  I don't need the general theoretical case of a theoretical app, but
  
   
  

  witango
    
   
 
 
  as the app server and mysql as the dbms.
  
  
  
  On 9/22/04 8:39 AM, "William M.Conlon" <[EMAIL PROTECTED]>
  
 wrote:
  
  
   
   
   
  Must reading:
  
  http://www.owasp.org/documentation/topten.html
  
    Welcome to the OWASP Top Ten Project
  
  The OWASP Top Ten provides a minimum standard for web application
  security. The OWASP Top Ten represents a broad consensus about what the
  most critical web application security flaws are. Project members
  include a variety of security experts from around the world who have
  shared their expertise to produce this list. There are currently
  versions in English, French, Japanese, and Korean. A Spanish version is
  in the works. We urge all companies to adopt the standard within their
  organization and start the process of ensuring that their web
  applications do not contain these flaws. Adopting the OWASP Top Ten is
  perhaps the most effective first step towards changing the software
  development culture within your organization into one that produces
  secure code.

Re: Witango-Talk: Security question

2004-09-22 Thread Sri Amudhanar




Since you provide your own SQL in a DirectDBMS action, you are responsible
for its quality, so like Gauthier suggests, use stored procedures/parametized
queries.
Sri Amudhanar
Maxys Corporation
Authorized Witango Reseller
Authorized Pervasive, Cisco, HP, Thawte Reseller.

Roland Dumas wrote:

  Re: Witango-Talk: Security question
I’m slow here. Does this mean that if there is
a SQL query in a DirectDBMS Action that it’s protected by this bind dust?
Or just New Record and Update Actions?
 
 
 On 9/22/04 11:34 AM, "Sri Amudhanar" <[EMAIL PROTECTED]> wrote:
 
 
  One of the lesser talked about features of Witango/Tango
server architecture is the advantage of "actions", especially the database
actions. According to what I have gleaned over the years (since I don't work
for Pervasive or Witango, and I don't have access to the Server source code),
the database action appears to "PREPARE" SQL and then "BIND" values to it
on the fly, before actually executing the statement. This way quotes and
other SQL breaking characters in the field values are prevented from breaking
the query. If you attempt to assemble your own SQL query for use in Witango/Tango,
PHP (which has no equivalent of a database action), or a Java application
etc, SQL hacking is a serious problem that will need to be addressed. Witango/Tango
<@BIND **> tags provide a great service here.
 For one answer to the question,  create a TAF that is used for login, (i.e.
searching on userid AND password) and enter the values for userid and password
as  *';  (star + single-quote + semicolon). If you query breaks the program
logic, you have a problem. If it doesn't, your system is innoculated against
this kind of SQL injection attack, at least.
 As they say, have fun!
 Sri Amudhanar
 Maxys Corporation
 
 
 [EMAIL PROTECTED] wrote:
 
 
 Hello,
 
 this issue is known as "SQL injection" problem, search on google for more
 information.
 
 You should use stored proc (if available) or parametized queries, and also
 rely on argument checking (B) to avoid completely this security issue.
 
 Hope this helps.
 
 Gauthier
 
 - Original Message -
 From: "Roland Dumas" <[EMAIL PROTECTED]> 
  
 To: <[EMAIL PROTECTED]> 
  
 Sent: Wednesday, September 22, 2004 5:52 PM
 Subject: Re: Witango-Talk: Security question
 
 
   
  
 
   
 I want the SHORT answer, something like:
 
 A.) If you use witango, a browser-sumitted piece of coding can't affect
 
  
 
   
 the
   
  
 
   
 database, witango, or a visitor who searches and gets the record with the
 code.
 B.) Holy s**t!: You're an idiot of you doing have a layer in front of a
 submit that searches and kills anything that looks like this.
 C.) It is theoretically possible to submit harmful code that might do
 this.
 
 If someone put some SQL in a text field, for instance, what might happen
 
  
 
   
 to
   
  
 
   
 it down the line?
 
 On a prior project, there was a unix head who thought he could break a
 witango app by submitting all kinds of junk. He tried and tried and
 
  
 
   
 failed.
   
  
 
   
 He put in SQL, unix commands, and all kinds of noise, but all it did was
 store it and show it back to him when he queried.  Is that my answer?
 
 I don't need the general theoretical case of a theoretical app, but
 
  
 
   
 witango
   
  
 
   
 as the app server and mysql as the dbms.
 
 
 
 On 9/22/04 8:39 AM, "William M.Conlon" <[EMAIL PROTECTED]>   wrote:
 
 
  
 
 
 Must reading:
 
 http://www.owasp.org/documentation/topten.html
 
   Welcome to the OWASP Top Ten Project
 
 The OWASP Top Ten provides a minimum standard for web application
 security. The OWASP Top Ten represents a broad consensus about what the
 most critical web application security flaws are. Project members
 include a variety of security experts from around the world who have
 shared their expertise to produce this list. There are currently
 versions in English, French, Japanese, and Korean. A Spanish version is
 in the works. We urge all companies to adopt the standard within their
 organization and start the process of ensuring that their web
 applications do not contain these flaws. Adopting the OWASP Top Ten is
 perhaps the most effective first step towards changing the software
 development culture within your organization into one that produces
 secure code.
 
 
 On Tuesday, September 21, 2004, at 11:43  PM, Ben Johansen wrote:
 
   
  
 
   
 Hi Roland,
 
 This is very unlikely; it is more likely that they would try to add sql
 statements in the input field.
 
 First of the data type constraints off the database field would
 probably
 either prevent the saving of the offensive code and will most likely
 truncate it.
 
 Even if there is supposedly evil script saved in the data, when pulled
 from
 the database it is not being viewed in a manner that will execute it.
 
 Plus, most firewalls and antivirus servers and client will block 

Witango-Talk: applications.ini and APPPATH

2004-09-22 Thread William M . Conlon
I'm confused about how the path is set for application execution.  I 
assume an 'application' is a collection of witango executables 
contained within a directory marked by <@APPPATH>.  But I seem to have 
trouble getting anything other than the first stanza in 
applications.ini to be recognized.

Am I reading this wrong?  My testing seems to indicate that Witango 
extracts the path relative to the web root directory, and determines 
the application from this sub-path, rather than the full-path.

I would like to have two witango applications defined in 
applications.ini, presumably set up as

[Applications]
app1=
app2=
[app1]
PATH=/path/to/app1
DEFAULTERRORFILE=/path/to/app1/error1.html
[app2]
PATH=/path/to/app2
DEFAULTERRORFILE=/path/to/app2/error2.html
Then my web sites would be configured as virtual hosts.  Below shows 
three domains, two using app1, and one using app2.  Is this possible?


ServerName app1.mydomain.com
DocumentRoot /path/to/app1


ServerName app1.yourdomain.com
DocumentRoot /path/to/app1


ServerName app2.mydomain.com
DocumentRoot /path/to/app2


So to test this out, I have a little taf that just displays:
Applicationswitch: @@system$applicationswitch
Appname: <@APPNAME>
AppPath: <@APPPATH>
APPFILEPATH: <@APPFILEPATH>
@@application$dedfaulterrorfile
When I execute this, I get back:
Applicationswitch: on
Appname: Default
AppPath: /
APPFILEPATH: /
It looks like ,
But some questions.
1.  How does witango extract the path to determine it's executing app1 
or app2.  <


TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


Re: Witango-Talk: startupurl problem

2004-09-22 Thread Roland Dumas

Most odd. I have a startup.taf that initializes domain variable and it's
pretty reliable. Never told to come back later.

On 9/22/04 3:03 PM, "Bill Conlon" <[EMAIL PROTECTED]> wrote:

> I want to initialize domain variables at server startup, but my
> startup.taf fails with the following:
> 
> 22/09/2004  14:49:3866.219.95.114
> [EMAIL PROTECTED]1102691248  1   0
> [Error] -1070 The server is starting up and can not process regular
> requests.
> 22/09/2004  14:49:3866.219.95.114
> [EMAIL PROTECTED]1102691248  1   0
> [Error] -1070 The server is starting up and can not process regular
> requests.
> 



TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


Re: Witango-Talk: Security question

2004-09-22 Thread Roland Dumas
Title: Re: Witango-Talk: Security question



I’m slow here. Does this mean that if there is a SQL query in a DirectDBMS Action that it’s protected by this bind dust? Or just New Record and Update Actions?


On 9/22/04 11:34 AM, "Sri Amudhanar" <[EMAIL PROTECTED]> wrote:

One of the lesser talked about features of Witango/Tango server architecture is the advantage of "actions", especially the database actions. According to what I have gleaned over the years (since I don't work for Pervasive or Witango, and I don't have access to the Server source code), the database action appears to "PREPARE" SQL and then "BIND" values to it on the fly, before actually executing the statement. This way quotes and other SQL breaking characters in the field values are prevented from breaking the query. If you attempt to assemble your own SQL query for use in Witango/Tango, PHP (which has no equivalent of a database action), or a Java application etc, SQL hacking is a serious problem that will need to be addressed. Witango/Tango <@BIND **> tags provide a great service here.
For one answer to the question,  create a TAF that is used for login, (i.e. searching on userid AND password) and enter the values for userid and password as  *';  (star + single-quote + semicolon). If you query breaks the program logic, you have a problem. If it doesn't, your system is innoculated against this kind of SQL injection attack, at least.
As they say, have fun!
Sri Amudhanar
Maxys Corporation


[EMAIL PROTECTED] wrote:
 
Hello,

this issue is known as "SQL injection" problem, search on google for more
information.

You should use stored proc (if available) or parametized queries, and also
rely on argument checking (B) to avoid completely this security issue.

Hope this helps.

Gauthier

- Original Message -
From: "Roland Dumas" <[EMAIL PROTECTED]>  
To: <[EMAIL PROTECTED]>  
Sent: Wednesday, September 22, 2004 5:52 PM
Subject: Re: Witango-Talk: Security question


  
 
 
I want the SHORT answer, something like:

A.) If you use witango, a browser-sumitted piece of coding can't affect

 
 
the
  
 
 
database, witango, or a visitor who searches and gets the record with the
code.
B.) Holy s**t!: You're an idiot of you doing have a layer in front of a
submit that searches and kills anything that looks like this.
C.) It is theoretically possible to submit harmful code that might do
this.

If someone put some SQL in a text field, for instance, what might happen

 
 
to
  
 
 
it down the line?

On a prior project, there was a unix head who thought he could break a
witango app by submitting all kinds of junk. He tried and tried and

 
 
failed.
  
 
 
He put in SQL, unix commands, and all kinds of noise, but all it did was
store it and show it back to him when he queried.  Is that my answer?

I don't need the general theoretical case of a theoretical app, but

 
 
witango
  
 
 
as the app server and mysql as the dbms.



On 9/22/04 8:39 AM, "William M.Conlon" <[EMAIL PROTECTED]>   wrote:


 
 
Must reading:

http://www.owasp.org/documentation/topten.html

  Welcome to the OWASP Top Ten Project

The OWASP Top Ten provides a minimum standard for web application
security. The OWASP Top Ten represents a broad consensus about what the
most critical web application security flaws are. Project members
include a variety of security experts from around the world who have
shared their expertise to produce this list. There are currently
versions in English, French, Japanese, and Korean. A Spanish version is
in the works. We urge all companies to adopt the standard within their
organization and start the process of ensuring that their web
applications do not contain these flaws. Adopting the OWASP Top Ten is
perhaps the most effective first step towards changing the software
development culture within your organization into one that produces
secure code.


On Tuesday, September 21, 2004, at 11:43  PM, Ben Johansen wrote:

  
 
 
Hi Roland,

This is very unlikely; it is more likely that they would try to add sql
statements in the input field.

First of the data type constraints off the database field would
probably
either prevent the saving of the offensive code and will most likely
truncate it.

Even if there is supposedly evil script saved in the data, when pulled
from
the database it is not being viewed in a manner that will execute it.

Plus, most firewalls and antivirus servers and client will block in the
unlikely event that the script is intact.

I have had this attempt happen to me, but the hacker didn't realize
that the
form didn't save to the database but was just emailed to me. I have
view the
code in Outlook without any issues.

Ben Johansen

-Original Message-
From: Roland Dumas [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 21, 2004 8:15 PM
To: [EMAIL PROTECTED]
Subject: Witango-Talk: Security question

Have a client who is asking questions about security. Specifically, if
there
is a field that is

RE: Witango-Talk: Search Action

2004-09-22 Thread David Shelley
Hi Steve,

You have a copy of my Tango Debugging Tools don't you? If so, connect to
your datasource, copy your select statement from the debug code and
paste it in the SQL Command window. Then tweak it manually until you get
the syntax just right. Maybe the column UDisabled is not a text
datatype, so you wouldn't want the value quoted.

ie
SELECT U1.UPWHint,U1.UEmail FROM User U1 WHERE (U1.UEmail='fog'
AND U1.UDisabled=1)

Dave

-Original Message-
From: Fogelson, Steve [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, September 22, 2004 5:38 PM
To: Witango User Group (E-mail)
Subject: Witango-Talk: Search Action

I am testing Witango 5.5.003 with Oterro 3.0

I am using a simple Search Action and I have a couple questions about
the
following debug:

1) Why does Witango change the SQL and use '?' for the variable values
and
then show them in BoundVals?

2) Any ideas about the syntax error?

[Query] [382] SELECT U1.UPWHint,U1.UEmail FROM User U1 WHERE
(U1.UEmail=?
AND U1.UDisabled=?) 
[BoundVals] [382] [v1='fog'; v2='1'] 
[Error] [396] 2367 [RBTI][Oterro ODBC Driver][Sports]-ERROR- Syntax
error
(2367) 42000

Thanks

Steve Fogelson
Internet Commerce Solutions

TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


Witango-Talk: startupurl problem

2004-09-22 Thread Bill Conlon
I want to initialize domain variables at server startup, but my 
startup.taf fails with the following:

22/09/2004  14:49:3866.219.95.114   
[EMAIL PROTECTED]1102691248  1   0   
[Error] -1070 The server is starting up and can not process regular 
requests.
22/09/2004  14:49:3866.219.95.114   
[EMAIL PROTECTED]1102691248  1   0   
[Error] -1070 The server is starting up and can not process regular 
requests.

Yet if I execute it from a browser, after the server starts:
22/09/2004  15:00:1866.219.95.118   
[EMAIL PROTECTED]1123670960  1   44  
[Application File]  START   /startup.tafWitangoServer
22/09/2004  15:00:1866.219.95.114   
[EMAIL PROTECTED]1134160816  2   39  
[Application File]  START   /init.taf   WitangoServer
22/09/2004  15:00:1866.219.95.114   
[EMAIL PROTECTED]1134160816  2   44  
[Application File]  END /init.taf
22/09/2004  15:00:1866.219.95.118   
[EMAIL PROTECTED]1123670960  1   104 
[User Message] startup.taf: Initialized domain variables for 
ccmhtest3.tothept.com
22/09/2004  15:00:1866.219.95.114   
[EMAIL PROTECTED]1113181104  2   41  
[Application File]  START   /init.taf   WitangoServer
22/09/2004  15:00:1866.219.95.114   
[EMAIL PROTECTED]1113181104  2   44  
[Application File]  END /init.taf
22/09/2004  15:00:1866.219.95.118   
[EMAIL PROTECTED]1123670960  1   152 
[User Message] startup.taf: Initialized domain variables for 
sox3.tothept.com
22/09/2004  15:00:1866.219.95.118   
[EMAIL PROTECTED]1123670960  1   153 
[Application File]  END /startup.taf

So why does the server execute the startupurl before it's ready to 
accept requests?  How does one delay the execution of startupurl until 
the server is running?


TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


Witango-Talk: Search Action

2004-09-22 Thread Fogelson, Steve
I am testing Witango 5.5.003 with Oterro 3.0

I am using a simple Search Action and I have a couple questions about the
following debug:

1) Why does Witango change the SQL and use '?' for the variable values and
then show them in BoundVals?

2) Any ideas about the syntax error?

[Query] [382] SELECT U1.UPWHint,U1.UEmail FROM User U1 WHERE (U1.UEmail=?
AND U1.UDisabled=?) 
[BoundVals] [382] [v1='fog'; v2='1'] 
[Error] [396] 2367 [RBTI][Oterro ODBC Driver][Sports]-ERROR- Syntax error
(2367) 42000

Thanks

Steve Fogelson
Internet Commerce Solutions

TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


Witango-Talk: undefined variables

2004-09-22 Thread Bill Conlon
I note there is a metatag <@DEFINE> to creates an empty variable of the 
specified type in the specified
scope.

How does one identify undefined variables?  The debugger, unfortunately 
will not catch this.  Will the 5.5 syntax checker catch it (doubtful, 
since it can't know the full execution context of an application)?  Can 
the server be configured to throw an error?

The typical problem is a mis-spelled variable name, but this can also 
occur if a dependency hasn't been satisfied, or if user variables have 
timed out.

Any thoughts?
thx

TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


RE: Witango-Talk: Mail Error

2004-09-22 Thread Steve Campbell
Hello Everyone

I have a simple taf that takes some information and sends a thank you thru
email right back to the user.  No big deal and matter of fact, the taf isn't
even in use yet, I am still testing it. 

Last night before I closed up shop, I tested it and it was working fine,
today I started to get this error.  Now, I have never seen this particular
error, so I was hoping someone here might have some advice.

Thanks 
Steve


Error message below


An unexpected error occurred while
Sending the mail message.
451 mail server temporarily rejected
Message (#4.3.0)

Main Error  -327

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.767 / Virus Database: 514 - Release Date: 9/21/2004
 



TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


Re: Witango-Talk: Security question

2004-09-22 Thread webdude
Sorry, but you forgot the "
it should read...   :-)
Should read:
 B.) Holy s*"*t!: You're an idiot if you don't have a layer in front of a
 new record or update that searches and kills anything that looks like
 this.

I flunked proofreading
This option:
On 9/22/04 8:52 AM, "Roland Dumas" <[EMAIL PROTECTED]> wrote:
 B.) Holy s**t!: You're an idiot of you doing have a layer in front of a
 submit that searches and kills anything that looks like this.
Should read:
 B.) Holy s**t!: You're an idiot if you don't have a layer in front of a
 new record or update that searches and kills anything that looks like
 > this.

TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf

TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


Re: Witango-Talk: Security question

2004-09-22 Thread Sri Amudhanar




One of the lesser talked about features of Witango/Tango server architecture
is the advantage of "actions", especially the database actions. According
to what I have gleaned over the years (since I don't work for Pervasive or
Witango, and I don't have access to the Server source code), the database
action appears to "PREPARE" SQL and then "BIND" values to it on the fly,
before actually executing the statement. This way quotes and other SQL breaking
characters in the field values are prevented from breaking the query. If
you attempt to assemble your own SQL query for use in Witango/Tango, PHP
(which has no equivalent of a database action), or a Java application etc,
SQL hacking is a serious problem that will need to be addressed. Witango/Tango
<@BIND **> tags provide a great service here.
For one answer to the question,  create a TAF that is used for login, (i.e.
searching on userid AND password) and enter the values for userid and password
as  *';  (star + single-quote + semicolon). If you query breaks the program
logic, you have a problem. If it doesn't, your system is innoculated against
this kind of SQL injection attack, at least.
As they say, have fun!
Sri Amudhanar
Maxys Corporation


[EMAIL PROTECTED] wrote:

  Hello,

this issue is known as "SQL injection" problem, search on google for more
information.

You should use stored proc (if available) or parametized queries, and also
rely on argument checking (B) to avoid completely this security issue.

Hope this helps.

Gauthier

- Original Message -
From: "Roland Dumas" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, September 22, 2004 5:52 PM
Subject: Re: Witango-Talk: Security question


  
  
I want the SHORT answer, something like:

A.) If you use witango, a browser-sumitted piece of coding can't affect

  
  the
  
  
database, witango, or a visitor who searches and gets the record with the
code.
B.) Holy s**t!: You're an idiot of you doing have a layer in front of a
submit that searches and kills anything that looks like this.
C.) It is theoretically possible to submit harmful code that might do
this.

If someone put some SQL in a text field, for instance, what might happen

  
  to
  
  
it down the line?

On a prior project, there was a unix head who thought he could break a
witango app by submitting all kinds of junk. He tried and tried and

  
  failed.
  
  
He put in SQL, unix commands, and all kinds of noise, but all it did was
store it and show it back to him when he queried.  Is that my answer?

I don't need the general theoretical case of a theoretical app, but

  
  witango
  
  
as the app server and mysql as the dbms.



On 9/22/04 8:39 AM, "William M.Conlon" <[EMAIL PROTECTED]> wrote:



  Must reading:

http://www.owasp.org/documentation/topten.html

  Welcome to the OWASP Top Ten Project

The OWASP Top Ten provides a minimum standard for web application
security. The OWASP Top Ten represents a broad consensus about what the
most critical web application security flaws are. Project members
include a variety of security experts from around the world who have
shared their expertise to produce this list. There are currently
versions in English, French, Japanese, and Korean. A Spanish version is
in the works. We urge all companies to adopt the standard within their
organization and start the process of ensuring that their web
applications do not contain these flaws. Adopting the OWASP Top Ten is
perhaps the most effective first step towards changing the software
development culture within your organization into one that produces
secure code.


On Tuesday, September 21, 2004, at 11:43  PM, Ben Johansen wrote:

  
  
Hi Roland,

This is very unlikely; it is more likely that they would try to add sql
statements in the input field.

First of the data type constraints off the database field would
probably
either prevent the saving of the offensive code and will most likely
truncate it.

Even if there is supposedly evil script saved in the data, when pulled
from
the database it is not being viewed in a manner that will execute it.

Plus, most firewalls and antivirus servers and client will block in the
unlikely event that the script is intact.

I have had this attempt happen to me, but the hacker didn't realize
that the
form didn't save to the database but was just emailed to me. I have
view the
code in Outlook without any issues.

Ben Johansen

-Original Message-
From: Roland Dumas [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 21, 2004 8:15 PM
To: [EMAIL PROTECTED]
Subject: Witango-Talk: Security question

Have a client who is asking questions about security. Specifically, if
there
is a field that is entered via web form and then placed in a database,
is
there the possibility that evil scripts can be submitted that will do
evil
things either to the database or to a user reading the content of that
column?


  


Re: Witango-Talk: Security question

2004-09-22 Thread gauthier-s
Hello,

this issue is known as "SQL injection" problem, search on google for more
information.

You should use stored proc (if available) or parametized queries, and also
rely on argument checking (B) to avoid completely this security issue.

Hope this helps.

Gauthier

- Original Message -
From: "Roland Dumas" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, September 22, 2004 5:52 PM
Subject: Re: Witango-Talk: Security question


>
> I want the SHORT answer, something like:
>
> A.) If you use witango, a browser-sumitted piece of coding can't affect
the
> database, witango, or a visitor who searches and gets the record with the
> code.
> B.) Holy s**t!: You're an idiot of you doing have a layer in front of a
> submit that searches and kills anything that looks like this.
> C.) It is theoretically possible to submit harmful code that might do
> this.
>
> If someone put some SQL in a text field, for instance, what might happen
to
> it down the line?
>
> On a prior project, there was a unix head who thought he could break a
> witango app by submitting all kinds of junk. He tried and tried and
failed.
> He put in SQL, unix commands, and all kinds of noise, but all it did was
> store it and show it back to him when he queried.  Is that my answer?
>
> I don't need the general theoretical case of a theoretical app, but
witango
> as the app server and mysql as the dbms.
>
>
>
> On 9/22/04 8:39 AM, "William M.Conlon" <[EMAIL PROTECTED]> wrote:
>
> > Must reading:
> >
> > http://www.owasp.org/documentation/topten.html
> >
> >   Welcome to the OWASP Top Ten Project
> >
> > The OWASP Top Ten provides a minimum standard for web application
> > security. The OWASP Top Ten represents a broad consensus about what the
> > most critical web application security flaws are. Project members
> > include a variety of security experts from around the world who have
> > shared their expertise to produce this list. There are currently
> > versions in English, French, Japanese, and Korean. A Spanish version is
> > in the works. We urge all companies to adopt the standard within their
> > organization and start the process of ensuring that their web
> > applications do not contain these flaws. Adopting the OWASP Top Ten is
> > perhaps the most effective first step towards changing the software
> > development culture within your organization into one that produces
> > secure code.
> >
> >
> > On Tuesday, September 21, 2004, at 11:43  PM, Ben Johansen wrote:
> >
> >> Hi Roland,
> >>
> >> This is very unlikely; it is more likely that they would try to add sql
> >> statements in the input field.
> >>
> >> First of the data type constraints off the database field would
> >> probably
> >> either prevent the saving of the offensive code and will most likely
> >> truncate it.
> >>
> >> Even if there is supposedly evil script saved in the data, when pulled
> >> from
> >> the database it is not being viewed in a manner that will execute it.
> >>
> >> Plus, most firewalls and antivirus servers and client will block in the
> >> unlikely event that the script is intact.
> >>
> >> I have had this attempt happen to me, but the hacker didn't realize
> >> that the
> >> form didn't save to the database but was just emailed to me. I have
> >> view the
> >> code in Outlook without any issues.
> >>
> >> Ben Johansen
> >>
> >> -Original Message-
> >> From: Roland Dumas [mailto:[EMAIL PROTECTED]
> >> Sent: Tuesday, September 21, 2004 8:15 PM
> >> To: [EMAIL PROTECTED]
> >> Subject: Witango-Talk: Security question
> >>
> >> Have a client who is asking questions about security. Specifically, if
> >> there
> >> is a field that is entered via web form and then placed in a database,
> >> is
> >> there the possibility that evil scripts can be submitted that will do
> >> evil
> >> things either to the database or to a user reading the content of that
> >> column?
> >>
>
>
> 
> TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf
>
> ___[ Pub ]
> Inscrivez-vous gratuitement sur Tandaime, Le site de rencontres !
> http://rencontre.rencontres.com/index.php?origine=4


___[ Pub ]
Inscrivez-vous gratuitement sur Tandaime, Le site de rencontres !
http://rencontre.rencontres.com/index.php?origine=4


TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


Re: Witango-Talk: Security question

2004-09-22 Thread Roland Dumas
I flunked proofreading

This option:
On 9/22/04 8:52 AM, "Roland Dumas" <[EMAIL PROTECTED]> wrote:

> B.) Holy s**t!: You're an idiot of you doing have a layer in front of a
> submit that searches and kills anything that looks like this.

Should read:
> B.) Holy s**t!: You're an idiot if you don't have a layer in front of a
> new record or update that searches and kills anything that looks like
> this.



TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


Re: Witango-Talk: Security question

2004-09-22 Thread Roland Dumas

I want the SHORT answer, something like:

A.) If you use witango, a browser-sumitted piece of coding can't affect the
database, witango, or a visitor who searches and gets the record with the
code.
B.) Holy s**t!: You're an idiot of you doing have a layer in front of a
submit that searches and kills anything that looks like this.
C.) It is theoretically possible to submit harmful code that might do
this.

If someone put some SQL in a text field, for instance, what might happen to
it down the line?

On a prior project, there was a unix head who thought he could break a
witango app by submitting all kinds of junk. He tried and tried and failed.
He put in SQL, unix commands, and all kinds of noise, but all it did was
store it and show it back to him when he queried.  Is that my answer?

I don't need the general theoretical case of a theoretical app, but witango
as the app server and mysql as the dbms.



On 9/22/04 8:39 AM, "William M.Conlon" <[EMAIL PROTECTED]> wrote:

> Must reading:
> 
> http://www.owasp.org/documentation/topten.html
> 
>   Welcome to the OWASP Top Ten Project
> 
> The OWASP Top Ten provides a minimum standard for web application
> security. The OWASP Top Ten represents a broad consensus about what the
> most critical web application security flaws are. Project members
> include a variety of security experts from around the world who have
> shared their expertise to produce this list. There are currently
> versions in English, French, Japanese, and Korean. A Spanish version is
> in the works. We urge all companies to adopt the standard within their
> organization and start the process of ensuring that their web
> applications do not contain these flaws. Adopting the OWASP Top Ten is
> perhaps the most effective first step towards changing the software
> development culture within your organization into one that produces
> secure code.
> 
> 
> On Tuesday, September 21, 2004, at 11:43  PM, Ben Johansen wrote:
> 
>> Hi Roland,
>> 
>> This is very unlikely; it is more likely that they would try to add sql
>> statements in the input field.
>> 
>> First of the data type constraints off the database field would
>> probably
>> either prevent the saving of the offensive code and will most likely
>> truncate it.
>> 
>> Even if there is supposedly evil script saved in the data, when pulled
>> from
>> the database it is not being viewed in a manner that will execute it.
>> 
>> Plus, most firewalls and antivirus servers and client will block in the
>> unlikely event that the script is intact.
>> 
>> I have had this attempt happen to me, but the hacker didn't realize
>> that the
>> form didn't save to the database but was just emailed to me. I have
>> view the
>> code in Outlook without any issues.
>> 
>> Ben Johansen
>> 
>> -Original Message-
>> From: Roland Dumas [mailto:[EMAIL PROTECTED]
>> Sent: Tuesday, September 21, 2004 8:15 PM
>> To: [EMAIL PROTECTED]
>> Subject: Witango-Talk: Security question
>> 
>> Have a client who is asking questions about security. Specifically, if
>> there
>> is a field that is entered via web form and then placed in a database,
>> is
>> there the possibility that evil scripts can be submitted that will do
>> evil
>> things either to the database or to a user reading the content of that
>> column?
>> 



TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


Re: Witango-Talk: Security question

2004-09-22 Thread William M . Conlon
Must reading:
http://www.owasp.org/documentation/topten.html
 Welcome to the OWASP Top Ten Project
The OWASP Top Ten provides a minimum standard for web application  
security. The OWASP Top Ten represents a broad consensus about what the  
most critical web application security flaws are. Project members  
include a variety of security experts from around the world who have  
shared their expertise to produce this list. There are currently  
versions in English, French, Japanese, and Korean. A Spanish version is  
in the works. We urge all companies to adopt the standard within their  
organization and start the process of ensuring that their web  
applications do not contain these flaws. Adopting the OWASP Top Ten is  
perhaps the most effective first step towards changing the software  
development culture within your organization into one that produces  
secure code.

On Tuesday, September 21, 2004, at 11:43  PM, Ben Johansen wrote:
Hi Roland,
This is very unlikely; it is more likely that they would try to add sql
statements in the input field.
First of the data type constraints off the database field would  
probably
either prevent the saving of the offensive code and will most likely
truncate it.

Even if there is supposedly evil script saved in the data, when pulled  
from
the database it is not being viewed in a manner that will execute it.

Plus, most firewalls and antivirus servers and client will block in the
unlikely event that the script is intact.
I have had this attempt happen to me, but the hacker didn't realize  
that the
form didn't save to the database but was just emailed to me. I have  
view the
code in Outlook without any issues.

Ben Johansen
-Original Message-
From: Roland Dumas [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 21, 2004 8:15 PM
To: [EMAIL PROTECTED]
Subject: Witango-Talk: Security question
Have a client who is asking questions about security. Specifically, if  
there
is a field that is entered via web form and then placed in a database,  
is
there the possibility that evil scripts can be submitted that will do  
evil
things either to the database or to a user reading the content of that
column?

___ 
_
TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf

___ 
_
TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf