[10637] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Advisory: NT ODBC Remote Compromise

daemon@ATHENA.MIT.EDU (Bigby Findrake)
Tue May 25 19:12:16 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.BSF.4.05.9905251441030.23507-100000@home.shiva.eu.org>
Date: 	Tue, 25 May 1999 14:43:25 -0700
Reply-To: Bigby Findrake <bigby@HOME.SHIVA.EU.ORG>
From: Bigby Findrake <bigby@HOME.SHIVA.EU.ORG>
X-To:         Vittal Aithal <vittal.aithal@REVOLUTIONLTD.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <D0CD3D370F64D211A25900104BAD8D595AAB8B@RMAIL>

On Tue, 25 May 1999, Vittal Aithal wrote:

> Here's some javascript stuff that'll clean up quotes and things before
> having them sent off in a sql query... only tested with access, so YMMV.

Do keep in mind that while this will stop people from using the
aforementioned exploits *only when using your forms*.  It is still
possible to download your web pages, remove the javascript hooks, and then
submit their information, or call the CGI(if method GET is accepted) by
hand and get around such security measures.

home help back first fref pref prev next nref lref last post