Cold Fusion and Sql Injection

From: George Fekkas (G.Fekkas_at_encode-sec.com)
Date: 06/20/03

  • Next message: morning_wood: "Re: Cold Fusion and Sql Injection"
    Date: Fri, 20 Jun 2003 20:12:35 +0300
    To: <pen-test@securityfocus.com>
    
    
    

    ******************************************************************
    Any views expressed in this message are those of the
    individual sender, except where the sender specifically
    states them to be the views of ENCODE S.A.
    ******************************************************************

    
    

    I am performing a web application penetration test by using SQL Injection method.The site uses Cold fusion. My problem is that anything I pass as a parameter to a field and I get the following error.

    ODBC Error Code = 22005 (Error in assignment)

    [Microsoft][ODBC SQL Server Driver][SQL Server]Syntax error converting the nvarchar value ‘my parameter here’ to a column of data type int.

    For example, if I place a simple quote I get the following:

    Syntax error converting the nvarchar value ‘’’ to a column of data type int.

    Or if I place a @@Version function I get the following:

    Syntax error converting the nvarchar value ‘@@Version’ to a column of data type int.

    Etc..

    Normally, when you pass a single quote as a parameter, the Server returns the following:

    ODBC Error Code = 37000 (Syntax error or access violation), and the error message is normally ‘Incorrect syntax error …’ OR ‘Unclosed quotation mark …’

    Does anyone know how to solve this problem?Can anyone tell me what really happens behind it? I mean how the cold fusion application handles input validation in conjunction with ODBC driver?Does cold fusion use special functions for input validation?

    Thank you for your time,

    George

     

    
    

    ---------------------------------------------------------------------------
    Latest attack techniques.

    You're a pen tester, but is google.com still your R&D team? Now you can get
    trustworthy commercial-grade exploits and the latest techniques from a
    world-class research group.

    Visit us at: www.coresecurity.com/promos/sf_ept1
    or call 617-399-6980
    ----------------------------------------------------------------------------


  • Next message: morning_wood: "Re: Cold Fusion and Sql Injection"