Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Bug Databases Microsoft Programming Software News IT

Half a Million Microsoft-Powered Sites Hit With SQL Injection 222

Titus Germanicus writes to tell us that a recent attack has compromised somewhere in the neighborhood of 500,000 pages with a SQL injection attack. The vulnerability seems to be limited to Microsoft's IIS webserver and is easily defeated by the end user with Firefox and "NoScript." "The automated attack takes advantage to the fact that Microsoft's IIS servers allow generic commands that don't require specific table-level arguments. However, the vulnerability is the result of poor data handling by the sites' creators, rather than a specific Microsoft flaw. In other words, there's no patch that's going to fix the issue, the problem is with the developers who failed follow well-established security practices for handling database input. The attack itself injects some malicious JavaScript code into every text field in your database, the Javascript then loads an external script that can compromise a user's PC." Ignoring corporate spin-doctoring, there seems to be plenty of blame to go around.
This discussion has been archived. No new comments can be posted.

Half a Million Microsoft-Powered Sites Hit With SQL Injection

Comments Filter:
  • Re:Dupe? (Score:4, Interesting)

    by calebt3 ( 1098475 ) on Monday April 28, 2008 @06:17PM (#23230570)
    At least this one is more accurate in saying 500,000 web pages and not servers.
  • by peragrin ( 659227 ) on Monday April 28, 2008 @06:42PM (#23230782)
    While I understand that why is it only MSFT IIS and MS SQL that's affected. If apache and MS SQL was being attacked and it has happened then i could fully understand it, but only MS IIS, MS SQL sites are affected. while the flaw may not be MSFT's sole fault how could 500,00 people setup a server wrong including the DHS? Maybe MSFT's history of poor coding and security practices lead to unsafe default options? security should always be over applied and then removed in layers.

    Security like clothing works best in layers. You can always add a layer but you can only remove so many. prepare for an Arctic winter to start with, and you will have everything you need for the beach.
  • by Sancho ( 17056 ) * on Monday April 28, 2008 @07:13PM (#23231084) Homepage
    As others have posted, it's pretty easy to prevent multiple instruction SQL injection. That's a function of the database driver, which Microsoft controls.

    It's much harder to prevent injection of additional parameters e.g. typing ' or '1'='1 into the text box--that's something that will be language and developer dependent. From my very brief scan of the details of this vulnerability, it looks like it would have been prevented if Microsoft had disallowed multiple statements in the driver.

    This page supports my interpretation. [hackademix.net] I note, specifically:

    Attackers carefully weighted the easiest spot, being a combination of

            * ASP classic, due to the poor coding standards among the average VBScripters who hardly known about prepared statements (even though they are supported)
            * ADO as the DB client layer, allowing stacked queries (multiple SQL statements together in a single string), which are not supported, for instance, by JDBC or by the mysql_query() PHP API
            * Microsoft SQL Server, because its Transact SQL supports a rich feature set including loops, metadata enumeration and Dynamic SQL (crucial for generalization), and because itâ(TM)s the most common ASP database back-end with such high-end features.
    Apparently, if stacked queries weren't allowed, this wouldn't nearly so easy to exploit.
  • by Cal Paterson ( 881180 ) * on Monday April 28, 2008 @07:35PM (#23231256)
    Ref. "National Highway Traffic Safety Administration" [wikipedia.org].

    I'm aware this is pretty tangential, but I found it interesting that the Corvair was eventually rated to be a pretty reasonable car by the government body that Nader's book created.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...