Re: SQL injection attack on House of Fusion

2008-08-15 Thread Mark Mandel
What I'm curious about, is that there seems to be noone you can report this to? I got hammered again the other day.. this time as well through whatever form fields they could find. Mark On Sat, Aug 16, 2008 at 12:07 PM, Al Musella, DPM <[EMAIL PROTECTED]> wrote: > And changed > EXEC to ExEC > >

Re: SQL injection attack on House of Fusion

2008-08-15 Thread Al Musella, DPM
And changed EXEC to ExEC I am getting hit pretty hard again. It stopped for a few days but they are back. At 06:56 PM 8/15/2008, you wrote: >They completely stopped on the 11th, but they are back to day spelling it >like "DeCLARE". > >~Brad ~

Re: SQL injection attack on House of Fusion

2008-08-15 Thread Brad Wood
They completely stopped on the 11th, but they are back to day spelling it like "DeCLARE". ~Brad - Original Message - From: "Claude Schneegans" <[EMAIL PROTECTED]> To: "CF-Talk" Sent: Friday, August 15, 2008 5:32 PM Subject: Re: SQL injection attack

Re: SQL injection attack on House of Fusion

2008-08-15 Thread Claude Schneegans
>>Not as far as technique, but it was much larger in scale than most of us have experience before. By the way, are you still getting hits from this attack? I don't see any anymore. -- ___ REUSE CODE! Use custom tags; See http://www.contentbox.com/claude/cust

Re: SQL injection attack on House of Fusion

2008-08-15 Thread Claude Schneegans
>>Going through 136+ posts seems a bit too much, many thanks. Arn't you affraid to get even more if you start another thread again? ;-) -- ___ REUSE CODE! Use custom tags; See http://www.contentbox.com/claude/customtags/tagstore.cfm (Please send any spam to t

Re: SQL injection attack on House of Fusion

2008-08-15 Thread Wil Genovese
As an FYI: for those that did use Apache configs to stop this attack, if you did not make sure your check was not case sensitive your being hit again. I just saw this start coming into our logs this afternoon: Note that DECLARE changed to DeCLARE. Some of the posts I saw for people to modify apac

Re: SQL injection attack on House of Fusion

2008-08-15 Thread Justin Scott
> But I know all this, I thought the sql injection attack went beyond it, > thanks anyway, Justin. Not as far as technique, but it was much larger in scale than most of us have experience before. Some were getting hit so hard they had to filter it farther up the chain (IIS, firewall, etc.) but

Re: SQL injection attack on House of Fusion

2008-08-15 Thread Charlie Griefer
On Fri, Aug 15, 2008 at 1:12 PM, Don L <[EMAIL PROTECTED]> wrote: > But I know all this, I thought the sql injection attack went beyond it, > thanks anyway, Justin. > it did not. -- A byte walks into a bar and orders a pint. Bartender asks him "What's wrong?" Byte says "Parity error." Bartender

Re: SQL injection attack on House of Fusion

2008-08-15 Thread Don L
But I know all this, I thought the sql injection attack went beyond it, thanks anyway, Justin. > The same place we've always been: > > * Validate user input > * Use CFQUERYPARAM > > For applications that have old code, run a tool that will tell you > what > queries need to be updated or run a

Re: SQL injection attack on House of Fusion

2008-08-15 Thread Justin Scott
> Sorry for the "top posting", where are we now in terms of best practice for > cf8 protection again sql injection attack? Going through 136+ posts seems a > bit too much, many thanks. Some one who has closely monitored this thread > probably could help. The same place we've always been: * V

Re: SQL injection attack on House of Fusion

2008-08-15 Thread Don L
Sorry for the "top posting", where are we now in terms of best practice for cf8 protection again sql injection attack? Going through 136+ posts seems a bit too much, many thanks. Some one who has closely monitored this thread probably could help. >Sorry for the problems with the House of Fusi

Re: SQL injection attack on House of Fusion

2008-08-12 Thread David Lakein
> >1) It protects only against known threats. In order to be excluded we > have > >to be a step far enough ahead to make sure the pattern is included. > >2) It will produce false positives. > >3) It is not role or user based. > >4) Tend to give a false sense of security. > > > Just to add to th

RE: SQL injection attack on House of Fusion

2008-08-12 Thread Dave Watts
> You of all people have been around long enough to know, that > if we as a developer could have our jobs made easier. Makes > me wonder why you made your comment? I don't see it as Adobe's place to tell me how to write code, which is essentially what a framework of any type does. In the same wa

Re: SQL injection attack on House of Fusion

2008-08-12 Thread denstar
On Mon, Aug 11, 2008 at 9:01 PM, Andrew Scott wrote: > But one can dream. Like you said, I also doubt it will become open > source this release... Or even the next, but it will happen... Mark those > words... While I don't think we'll get away from SQL anytime soon, I have managed to get

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Andrew Scott
oper Aegeon Pty. Ltd. www.aegeon.com.au Phone: +613 9015 8628 Mobile: 0404 998 273 -Original Message- From: Dave Watts [mailto:[EMAIL PROTECTED] Sent: Tuesday, 12 August 2008 2:44 AM To: CF-Talk Subject: RE: SQL injection attack on House of Fusion > The second is that this is why. ColdFusion

Re: SQL injection attack on House of Fusion

2008-08-11 Thread James Holmes
Interestingly, hibernate is one of the rumoured additions to CF9: http://www.barneyb.com/barneyblog/2008/06/19/cfunited-day-one/ etc On Tue, Aug 12, 2008 at 12:44 AM, Dave Watts <[EMAIL PROTECTED]> wrote: > > ColdFusion is a programming language, like Java. Just as Java doesn't come > with an OR

Re: SQL injection attack on House of Fusion

2008-08-11 Thread denstar
On Mon, Aug 11, 2008 at 10:11 AM, Jochem van Dieten wrote: > I just see different degrees of guilt. Negligence from developers, > greedy shortcuts from management, lazyness from end users, criminal > intent from hackers etc. I don't see ISPs on there, and while I'm no fan of much of the ISP-b

Re: SQL injection attack on House of Fusion

2008-08-11 Thread denstar
On Sun, Aug 10, 2008 at 6:35 AM, Bobby Hartsfield wrote: > Suggesting and getting caught doing are 2 different things. IF > writing/posting code were an issue though... then everyone who posted the > full script would be worried ;-) I hope it's just chicken-little, but it's happening to other coun

Re: SQL injection attack on House of Fusion

2008-08-11 Thread Wil Genovese
Security in layers. While it is usually best to thwart this style of attack at the route/firewall, it is wise to have the extra layers at the Apache/IIS/webserver, Coldfusion Application, CF Query and JDBC DB user permission layers. If the first layer is bypassed or compromised then the next laye

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Dave Watts
> The second is that this is why. ColdFusion should have > adopted an approach that used an ORM instead With an ORM > it reduces the risk, provided the ORM takes these attacks seriously. > > I have never seen these attacks with hibernate, within GORM > and Domain Driven design approache

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Dave Watts
> Viewing this as a rape case, if a girl was hanging out on a > street corner and asking passers-by to rape her, then, yes, > she bears some responsibility for putting herself in that > situation. It doesn't mean the one who rapes her doesn't > bear the greater responsibility for the situation

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Dave Watts
> Ah. You're from the "blame the victim" school. > > Unfortunately, when I wrote the first 1,000 ColdFusion > templates using Ben Forta's CF 4.0 book, there was no > CFQueryParam. So going back and rewriting all those programs > (now well into several thousand) has been a bitch. And all > i

Re: SQL injection attack on House of Fusion

2008-08-11 Thread Dana Kowalski
Seeing code solutions to this is cool. but imho its best left to your router/firewall to handle. I'd contact the provider to have them put some better controls in place. These are scenarios that almost delve into why cisco has the zero day features on their gear.. ~

Re: SQL injection attack on House of Fusion

2008-08-11 Thread Jochem van Dieten
Dave Morris wrote: > Ah. You're from the "blame the victim" school. I just see different degrees of guilt. Negligence from developers, greedy shortcuts from management, lazyness from end users, criminal intent from hackers etc. > So I shouldn't be mad at the poor little hackers, because they

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Rick Faircloth
gt; From: Mark Kruger [mailto:[EMAIL PROTECTED] > Sent: Monday, August 11, 2008 11:24 AM > To: CF-Talk > Subject: RE: SQL injection attack on House of Fusion > > Rick, > > While your argument is well put, perhaps we could choose a slightly less > inflammatory analogy than ra

Re: SQL injection attack on House of Fusion

2008-08-11 Thread Tom Chiverton
On Monday 11 Aug 2008, Brad Wood wrote: > I'm fairly convinced this bot used the Internet Explorer on the victims It would make sense to use the same ActiveX control IE uses, yes. -- Tom Chiverton This email is sent for and on behalf of Hall

Re: SQL injection attack on House of Fusion

2008-08-11 Thread Greg Morphis
: Monday, August 11, 2008 9:45 AM > To: CF-Talk > Subject: RE: SQL injection attack on House of Fusion > > This would probably be more productively viewed as as "responsibility" > issue, rather than blame. > > Both parties, webmaster and attacker, bear responsibility for the

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Robert Rawlins
l Message- From: Rick Faircloth [mailto:[EMAIL PROTECTED] Sent: 11 August 2008 15:45 To: CF-Talk Subject: RE: SQL injection attack on House of Fusion This would probably be more productively viewed as as "responsibility" issue, rather than blame. Both parties, webmaster and attacker, bea

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Mark Kruger
ssage- From: Rick Faircloth [mailto:[EMAIL PROTECTED] Sent: Monday, August 11, 2008 9:45 AM To: CF-Talk Subject: RE: SQL injection attack on House of Fusion This would probably be more productively viewed as as "responsibility" issue, rather than blame. Both parties, webmaster and

Re: SQL injection attack on House of Fusion

2008-08-11 Thread Brad Wood
Sent: Monday, August 11, 2008 3:37 AM Subject: RE: SQL injection attack on House of Fusion > Hmmm... > > Of course it is possible to use cookies They chose not too... Why... > Because they have no real need to be attached to a se

Re: SQL injection attack on House of Fusion

2008-08-11 Thread Larry Lyons
Criticizing someone for negligence is not blaming the victim. If the person who coded the site is so incompetent as not to include a cfqueryparam for any user input that has direct impact on the database, then they deserve to get blamed. What's so difficult about As for going back and finding

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Rick Faircloth
Morris > > > > > > > >> -----Original Message- > >> From: Greg Morphis [mailto:[EMAIL PROTECTED] > >> Sent: Monday, August 11, 2008 9:04 AM > >> To: CF-Talk > >> Subject: Re: SQL injection attack on House of Fusion > >> >

Re: SQL injection attack on House of Fusion

2008-08-11 Thread Greg Morphis
CHOP away at > our systems until they find that one hole we didn't catch, and then blame it > on the victim! > > Dave Morris > > > >> -Original Message- >> From: Greg Morphis [mailto:[EMAIL PROTECTED] >> Sent: Monday, August 11, 2008 9:04 AM >>

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Dave Morris
CHOP away at our systems until they find that one hole we didn't catch, and then blame it on the victim! Dave Morris > -Original Message- > From: Greg Morphis [mailto:[EMAIL PROTECTED] > Sent: Monday, August 11, 2008 9:04 AM > To: CF-Talk > Subject: Re: SQL injection

Re: SQL injection attack on House of Fusion

2008-08-11 Thread Justin Scott
> I'm sure they exist even for CF 4.0 Yup, the val() function did/does wonders for integer input on queries, even way back in CF4. -Justin Scott ~| Adobe® ColdFusion® 8 software 8 is the most important and dramatic release

Re: SQL injection attack on House of Fusion

2008-08-11 Thread Greg Morphis
mad at the poor little hackers, because they were doing us > all favor by pointing out our faults. That is your school of thought, > right? > > Dave Morris > > >> -Original Message- >> From: Dave Watts [mailto:[EMAIL PROTECTED] >> Sent: Sunday, August

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Dave Morris
: Sunday, August 10, 2008 11:15 PM > To: CF-Talk > Subject: RE: SQL injection attack on House of Fusion > > > Anyway, I propose the dot-com millionaires who left us stuck > > with the current mess in the spam and virus arena be > > personally required to fund an internat

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Andrew Scott
-Original Message- From: Wil Genovese [mailto:[EMAIL PROTECTED] Sent: Saturday, 9 August 2008 2:26 AM To: CF-Talk Subject: Re: SQL injection attack on House of Fusion very few bots accept cookies. I've never actually seen one that does, but I have read it is possible to writ

RE: SQL injection attack on House of Fusion

2008-08-11 Thread Andrew Scott
Phone: +613 9015 8628 Mobile: 0404 998 273 -Original Message- From: Ben Forta [mailto:[EMAIL PROTECTED] Sent: Saturday, 9 August 2008 2:05 AM To: CF-Talk Subject: RE: SQL injection attack on House of Fusion Yep, was curious about that too. I modified Justin's script to not send e-

RE: SQL injection attack on House of Fusion

2008-08-10 Thread Dave Watts
> Anyway, I propose the dot-com millionaires who left us stuck > with the current mess in the spam and virus arena be > personally required to fund an international Goon Squad with > kneecap breaking instructions to go after these vandals. And who exactly would that be? > If someone did this c

Re: SQL injection attack on House of Fusion

2008-08-10 Thread Michael Dinowitz
Wait, sorry. This is a cf-community thread, not a cf-talk one. It will be moved right away. On Sun, Aug 10, 2008 at 11:32 PM, Michael Dinowitz < [EMAIL PROTECTED]> wrote: > I propose a baseball bat. It works well with both genders. > > On Sun, Aug 10, 2008 at 11:16 PM, William Seiter <[EMAIL PROT

Re: SQL injection attack on House of Fusion

2008-08-10 Thread Michael Dinowitz
I propose a baseball bat. It works well with both genders. On Sun, Aug 10, 2008 at 11:16 PM, William Seiter <[EMAIL PROTECTED]> wrote: > You assume much. > > Women are just as prowess at running a computer virus attack as men. > > We just don't hear about them as much, as they seem to not get cau

Re: SQL injection attack on House of Fusion

2008-08-10 Thread Dave Morris
You haven't been around teenage boys much recently. That and the XBox are the ONLY things they would miss. Anyway, I propose the dot-com millionaires who left us stuck with the current mess in the spam and virus arena be personally required to fund an international Goon Squad with kneecap brea

RE: SQL injection attack on House of Fusion

2008-08-10 Thread William Seiter
o: CF-Talk ::Subject: Re: SQL injection attack on House of Fusion :: ::>I've heard that in Saudi Arabia, a thief has the offending member removed ::at ::>the wrist. Since hackers commit their offence with their brain, wouldn't ::it ::>be appropriate to behead them? ::> ::>Just

Re: SQL injection attack on House of Fusion

2008-08-10 Thread Larry Lyons
>I've heard that in Saudi Arabia, a thief has the offending member removed at >the wrist. Since hackers commit their offence with their brain, wouldn't it >be appropriate to behead them? > >Just a suggestion. :-\ > >Dave L. Personally I'd rather they had a different part of their anatomy cut off.

RE: SQL injection attack on House of Fusion

2008-08-10 Thread Bobby Hartsfield
t in your reply :-o Heh ..:.:.:.:.:.:.:.:.:.:. Bobby Hartsfield http://acoderslife.com http://cf4em.com -Original Message- From: Brad Wood [mailto:[EMAIL PROTECTED] Sent: Saturday, August 09, 2008 11:51 PM To: CF-Talk Subject: Re: SQL injection attack on House of Fusion I'd tell y

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Brad Wood
I'd tell you to watch what you suggest on a public forum, but heck-- we already know the FBI doesn't care. :) ~Brad > Hmmm... if everyone did something like this... it would not only be > funny... > but probably piss off apnic and make them do something about their portion > of this problem (w

RE: SQL injection attack on House of Fusion

2008-08-09 Thread Bobby Hartsfield
http://cf4em.com -Original Message- From: Mike Kear [mailto:[EMAIL PROTECTED] Sent: Saturday, August 09, 2008 4:49 PM To: CF-Talk Subject: Re: SQL injection attack on House of Fusion I guess i'm missing something, Bobby. Why does a big share of the problem belong to Apnic? Cheers

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Mike Kear
I guess i'm missing something, Bobby. Why does a big share of the problem belong to Apnic? Cheers Mike Kear Windsor, NSW, Australia Adobe Certified Advanced ColdFusion Developer AFP Webworks http://afpwebworks.com ColdFusion, PHP, ASP, ASP.NET hosting from AUD$15/month On Sun, Aug 10, 2008

RE: SQL injection attack on House of Fusion

2008-08-09 Thread Bobby Hartsfield
om -Original Message- From: Brad Wood [mailto:[EMAIL PROTECTED] Sent: Saturday, August 09, 2008 1:37 PM To: CF-Talk Subject: Re: SQL injection attack on House of Fusion Bobby, what have you been using to look up the origin of the IPs en masse? I found a site that let's me do

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Brad Wood
obby Hartsfield" <[EMAIL PROTECTED]> To: "CF-Talk" Sent: Saturday, August 09, 2008 11:58 AM Subject: RE: SQL injection attack on House of Fusion > Now look at how many of those are from Asia Pacific Network Info Centre

RE: SQL injection attack on House of Fusion

2008-08-09 Thread Bobby Hartsfield
: SQL injection attack on House of Fusion Here are my top 50: Note that the top 1 is in the same subnet as your top 1. I had 134,993 attempts that I caught.. IP (times) 203.160.1.52 (705) 203.162.3.160 (373) 203.160.1.76 (325) 61.164.132.230 (325) 59.15.212.125 (258) 210.112.177.244 (252

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Al Musella, DPM
Here are my top 50: Note that the top 1 is in the same subnet as your top 1. I had 134,993 attempts that I caught.. IP (times) 203.160.1.52 (705) 203.162.3.160 (373) 203.160.1.76 (325) 61.164.132.230 (325) 59.15.212.125 (258) 210.112.177.244 (252) 70.189.143.59 (219) 221.253.217.138 (204) 96

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Jochem van Dieten
Terry Ford wrote: > Nimda did not use SQL injection as any sort of primary vector. But it infected websites in order to infect browsers in order to infect websites etc. So the current wave of worms using the same mechanism is really 7 years too late to be ingenious. Jochem

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Terry Ford
deal with a major flaw in its own software. That's rare ;) http://www.microsoft.com/technet/security/advisory/954462.mspx --- On Sat, 8/9/08, Jochem van Dieten <[EMAIL PROTECTED]> wrote: > From: Jochem van Dieten <[EMAIL PROTECTED]> > Subject: Re: SQL injection attack

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Mary Jo Sminkey
>1) It protects only against known threats. In order to be excluded we have >to be a step far enough ahead to make sure the pattern is included. >2) It will produce false positives. >3) It is not role or user based. >4) Tend to give a false sense of security. Just to add to this, in my own testi

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Raymond Camden
Still no go for me. I appreciate the help from all. On Sat, Aug 9, 2008 at 8:58 AM, Wil Genovese <[EMAIL PROTECTED]> wrote: > Ray, > > Our sysadmin ran into the same issue when we started on this > yesterday Here is part of the rule we're using now and it works for > the case yours does not. note

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Wil Genovese
Ray, Our sysadmin ran into the same issue when we started on this yesterday Here is part of the rule we're using now and it works for the case yours does not. note the ^. RewriteCond %{QUERY_STRING} ^.*DECLARE.*$ Wil Genovese One man with courage makes a majority. -Andrew Jackson A fine

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Raymond Camden
Ok, I've noticed that when I go to host.com/?declare it is working but host.com/x/index.cfm?';[EMAIL PROTECTED](4000);[EMAIL PROTECTED](0x4445434C415245204054207661726368617228323535292C40432076617263686172283430303029204445434C415245205461626C655F437572736F7220435552534F5220464F522073656C6563

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Raymond Camden
No go. It's not life or death - Im still using cfqueryparam, but I'd love to get this working at the lowest level. On Fri, Aug 8, 2008 at 11:47 PM, denstar <[EMAIL PROTECTED]> wrote: > non-wrapped (and it was grabbed off the web somewhere): > > Options +FollowSymLinks > Options +Indexes > Rewri

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Jon Clausen
Depending on your default directory settings in httpd.conf, you may need to add the following directory attributes as well to your site to allow mod_rewrite to operate: #Allow mod rewrite on this directory Options FollowSymLinks AllowOverride All Order deny,allow Allow from all Also, you ca

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Matt Williams
On Fri, Aug 8, 2008 at 11:12 PM, Raymond Camden <[EMAIL PROTECTED]> wrote: > Hmm. I'm having no luck with this. I'm trying it on a blogcfc site, so > it's being added after /, so I also added path_info > > RewriteEngine on > RewriteCond %{QUERY_STRING} .*DECLARE.* [NC] > RewriteRule ^(.*)$ /vi

Re: SQL injection attack on House of Fusion

2008-08-09 Thread Jochem van Dieten
Terry Ford wrote: > Pretty ingenious really, infecting websites via injection attack in order to > infect clients with browser vulnerabilities. In 2001 it was: http://www.cert.org/advisories/CA-2001-26.html Now it is just business as usual. Jochem ~~

Re: SQL injection attack on House of Fusion

2008-08-08 Thread denstar
Theoretically, it would be possible to write a code-review type tool that uses database introspection to rewrite queries to use the proper cfqueryparms everywhere. Wouldn't work for queries built by code tho, so... hmmm I wonder why we can't do something like that at a lower-level, ya know?

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Terry Ford
w from all RewriteEngine On . rewrites here Regards --- On Sat, 8/9/08, Raymond Camden <[EMAIL PROTECTED]> wrote: > From: Raymond Camden <[EMAIL PROTECTED]> > Subject: Re: SQL injection attack on House of Fusion > To: "CF-Talk" > Date: Saturday, August 9, 2008,

Re: SQL injection attack on House of Fusion

2008-08-08 Thread denstar
non-wrapped (and it was grabbed off the web somewhere): Options +FollowSymLinks Options +Indexes RewriteEngine On RewriteCond %{QUERY_STRING} .*DECLARE.* [NC] RewriteRule .* /violation.htm [L] RewriteCond %{PATH_INFO} .*DECLARE.* [NC] RewriteRule .* /violation.htm [L] The [L] tells

Re: SQL injection attack on House of Fusion

2008-08-08 Thread denstar
Strange. And it looks like it /should/ work in the server conf too. Might be something like symlinks being turned off in the main Directory block or something. Try adding this (we'll leave off the ifModule, as we'd want an error if we don't have mod_rewrite loaded (and I'd try to limit where I'm

RE: SQL injection attack on House of Fusion

2008-08-08 Thread Mark Kruger
Pete, Gabriel Reed and Mary Jo Sminkey created a decent regex and script that does a good job. http://www.coldfusionmuse.com/index.cfm/2008/7/28/Coldfusion-Blacklist-Funct ion-for-SQLi It uses a native java regex pattern matcher for effeciency - meaning it will work only on cf 6.x or above. Mar

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Raymond Camden
Hmm. I'm having no luck with this. I'm trying it on a blogcfc site, so it's being added after /, so I also added path_info RewriteEngine on RewriteCond %{QUERY_STRING} .*DECLARE.* [NC] RewriteRule ^(.*)$ /violation.htm RewriteCond %{PATH_INFO} .*DECLARE.* [NC] RewriteRule ^(.*)$ /vio

Re: SQL injection attack on House of Fusion

2008-08-08 Thread denstar
You can keep it in a different .conf file, and use the Include directive, to pull it in wherever you need it, BTW. -- Employ your time in improving yourself by other men's writings, so that you shall gain easily what others have labored hard for. Socrates On Fri, Aug 8, 2008 at 10:05 PM, denstar

Re: SQL injection attack on House of Fusion

2008-08-08 Thread denstar
A simple look at the docs would state why, but it doesn't appear to work if you've got it "floating" (rewrites in general). I don't remember, off hand. I'm pretty sure it will work in a Directory or Location block too, tho. -- Employ your time in improving yourself by other men's writings, so t

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Raymond Camden
I've tried this on a windows apache server, but it doesn't seem to be working. Must it be in a VirtualDirectory block? I have it set outside so as to work on all sites. On Fri, Aug 8, 2008 at 2:45 PM, Terry Ford <[EMAIL PROTECTED]> wrote: > Our site has now seen just over 200,000 attack attempts

Re: SQL injection attack on House of Fusion

2008-08-08 Thread denstar
I think it goes: RewriteCond %{QUERY_STRING} .*DECLARE.* [NC] to have the no-case option. Thanks for clarifying the loadmodule stuff, I should'a said something along those lines earlier. -- Employ your time in improving yourself by other men's writings, so that you shall gain easily what other

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Pete Ruckelshaus
Has anyone written a broad-spectrum script (i.e. scrubs URL variables, form variables, looks for verboten words, etc.) that is effective against these attacks? If not, why don't we get coordinated and write something as a community that users can simple include/invoke via application.cfm or in spe

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Matt Williams
Scratch that. declare is case sensitive. Seems to work now. Matt On Fri, Aug 8, 2008 at 6:00 PM, Matt Williams <[EMAIL PROTECTED]> wrote: > On Fri, Aug 8, 2008 at 2:45 PM, Terry Ford <[EMAIL PROTECTED]> wrote: >> Here's the rewrite I'm using (linux apache) to keep traffic off the app >> server. >

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Brad Wood
Original Message - From: "Eric P" <[EMAIL PROTECTED]> > The problem becomes even more difficult to enforce > since ISPs don't necessarily want to offend their paying customers. It depends on the ISP. I've seen plenty that didn't mind telling a customer they needed to clean their server

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Matt Williams
On Fri, Aug 8, 2008 at 2:45 PM, Terry Ford <[EMAIL PROTECTED]> wrote: > Here's the rewrite I'm using (linux apache) to keep traffic off the app > server. > > RewriteCond %{QUERY_STRING} .*DECLARE.* > RewriteRule ^(.*)$ violation.htm [nc,L] Okay, I'm a rewrite and apache newbie. I'm trying to rep

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Brad Wood
- Original Message - From: "Wil Genovese" <[EMAIL PROTECTED]> > on. So go ahead and just block THE WORLD. > I don't plan on blocking anyone. I just wanted to play with the data. :) ~Brad ~| Adobe® ColdFusion® 8 sof

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Gerald Guido
>> If you use CF to write the bot, for instance ;-) Speaking of such, snagging a cookie with CF is ridiculously easy (of course it is ;) ). cfhttp returns the responseHeader a structure. EX: This: #cfhttp.responseHeader["Set-Cookie"]# Returns this: mytestcookie=test;expires=Sun, 01-Aug-20

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Matt Robertson
Well I guess I'm glad I am not the only one dealing with this. I implemented at the top of /Application.cfm and that stopped it dead in its tracks, but not before spiking my custom logging app and turning my weekly sales response figures to oatmeal. A little spit and polish fixed that.

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Eric P
On Fri, Aug 8, 2008 at 4:13 PM, Claude Schneegans <[EMAIL PROTECTED]> wrote: > >>Then 20-30 minutes later he would show up again with a different IP. > > How do you know it was the same guy ? > May be it was the same bot doing the same thing, but these bots are just > like viruses, > they spread a

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Claude Schneegans
>>Then 20-30 minutes later he would show up again with a different IP. How do you know it was the same guy ? May be it was the same bot doing the same thing, but these bots are just like viruses, they spread anywhere. -- ___ REUSE CODE! Use custom tags; See

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Wil Genovese
ime. > > ~Brad > > - Original Message - > From: "Andy Matthews" <[EMAIL PROTECTED]> > To: "CF-Talk" > Sent: Friday, August 08, 2008 3:00 PM > Subject: RE: SQL injection attack on House of Fusion > > >> blocking the IPs would probably s

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Terry Ford
list of 12,000 IP addresses (and counting at the rate of 500+ new IP addresses each hour) of this botnet available if that's of any use to anyone. Regards --- On Fri, 8/8/08, Brad Wood <[EMAIL PROTECTED]> wrote: > From: Brad Wood <[EMAIL PROTECTED]> > Subject: Re: SQL

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Eric P
On Fri, Aug 8, 2008 at 3:25 PM, Brad Wood <[EMAIL PROTECTED]> wrote: > Yeah, I'm well aware of the near impossibility of ever tracking IP address > to anything useful, but I'm a person who likes data, for within mounds of > useless data can be found trends. Most of all, I'm just curious. Also, I'

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Brad Wood
24/7 uptime. ~Brad - Original Message - From: "Andy Matthews" <[EMAIL PROTECTED]> To: "CF-Talk" Sent: Friday, August 08, 2008 3:00 PM Subject: RE: SQL injection attack on House of Fusion > blocking the IPs would probably stop the attacks, but analyzing them is > g

RE: SQL injection attack on House of Fusion

2008-08-08 Thread Andy Matthews
-Original Message- From: Brad Wood [mailto:[EMAIL PROTECTED] Sent: Friday, August 08, 2008 11:03 AM To: CF-Talk Subject: Re: SQL injection attack on House of Fusion Tell us how you really feel Ben. :) I had to temporarily stop apache on my site long enough to get a stop gap in place.

RE: SQL injection attack on House of Fusion

2008-08-08 Thread Andy Matthews
-Original Message- From: Brad Wood [mailto:[EMAIL PROTECTED] Sent: Friday, August 08, 2008 11:03 AM To: CF-Talk Subject: Re: SQL injection attack on House of Fusion Tell us how you really feel Ben. :) I had to temporarily stop apache on my site long enough to get a stop gap in place.

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Michael Dinowitz
I'm using ionic isapi with the following RewriteCond %{QUERY_STRING} ;DECLARE [I] RewriteRule ;DECLARE /index.htm [I,L] it works perfectly except for a single issue. If you're using a custom 404 in iis (like piping 404 errors to CF), then the isapi will hang the server. -- Michael Dinowitz (http

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Terry Ford
Our site has now seen just over 200,000 attack attempts over the past 48 hours, 73,000 attack attempts over the past 5 hours. Not nearly a DOS concern yet, as the acceleration of attacks has started to at least flatten a bit over the last 2-3 hours, but we're watching it carefully. The attacks

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Brad Wood
They might be doing a screen scrape looking for an error message to see if they've hit on a vulnerable parameter. When/if the find one, they probably log it or attempt to attack it. ~Brad > For example, we'll see three successive errant query strings come > through like this. > > ?a=1'&b=2&c=3

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Eric P
We've also noticed these SQL injection attempts rear their head the last day or so; saw almost the exact same type of attack (I.e., same injection payload) back in April as well. The attack we're seeing is very (MS) SQL Server specific as they're trying to hit some SQL Server system tables and inj

RE: SQL injection attack on House of Fusion

2008-08-08 Thread Andy Matthews
Hysterical!! -Original Message- From: Mike Kear [mailto:[EMAIL PROTECTED] Sent: Friday, August 08, 2008 12:14 PM To: CF-Talk Subject: Re: SQL injection attack on House of Fusion Ben Forta said > <<<<> On the plus side, it's nice to see CF finally get

RE: SQL injection attack on House of Fusion

2008-08-08 Thread Andy Matthews
Hysterical!! -Original Message- From: Mike Kear [mailto:[EMAIL PROTECTED] Sent: Friday, August 08, 2008 12:14 PM To: CF-Talk Subject: Re: SQL injection attack on House of Fusion Ben Forta said > <<<<> On the plus side, it's nice to see CF finally get

RE: SQL injection attack on House of Fusion

2008-08-08 Thread Dave Long
[EMAIL PROTECTED] > Sent: Friday, August 08, 2008 12:36 PM > To: CF-Talk > Subject: RE: SQL injection attack on House of Fusion > > > > even if it is from parasitic bottom-feeding bots created by > despicable > > scum-sucking feeble-excuse-for-a-carbon-based-li

RE: SQL injection attack on House of Fusion

2008-08-08 Thread Dave Watts
> > ... by despicable scum-sucking feeble-excuse-for-a- > > carbon-based-life-form repugnant socially-inept > > basement-dwelling death-penalty-deserving hacker-wannabes. > > What makes you think they're lawyers, Ben? That really isn't called for, Mike. You should be ashamed of yourself. Lawyers

RE: SQL injection attack on House of Fusion

2008-08-08 Thread Mark Kruger
Mike, That's the funniest comment I've heard this week... 10 points for Mr.Kear. -mark -Original Message- From: Mike Kear [mailto:[EMAIL PROTECTED] Sent: Friday, August 08, 2008 12:14 PM To: CF-Talk Subject: Re: SQL injection attack on House of Fusion Ben Forta said

RE: SQL injection attack on House of Fusion

2008-08-08 Thread Rick Faircloth
lly* feel! :o) > -Original Message- > From: Ben Forta [mailto:[EMAIL PROTECTED] > Sent: Friday, August 08, 2008 11:51 AM > To: CF-Talk > Subject: RE: SQL injection attack on House of Fusion > > Yep, I turned e-mail notifications off too, leave it on and you can > inadvertent

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Mike Kear
Ben Forta said > > On the plus side, it's nice to see CF finally getting the recognition it > deserves, even if it is from parasitic bottom-feeding bots created by > despicable scum-sucking feeble-excuse-for-a-carbon-based-life-form repugnant > socially-inept basement-dwelling death-penalty

Re: SQL injection attack on House of Fusion

2008-08-08 Thread Brad Wood
: "Wil Genovese" <[EMAIL PROTECTED]> To: "CF-Talk" Sent: Friday, August 08, 2008 11:26 AM Subject: Re: SQL injection attack on House of Fusion > very few bots accept cookies. I've never actually seen one that does, > but I have read it is

<    1   2   3   >