DoS attacks using SQL Wildcards - White Paper

2008.05.21
Risk: Low
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.8/10
Impact Subscore: 6.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Complete

This paper discusses abusing Microsoft SQL Query wildcards to consume CPU in database servers using only the search field present in most common web applications. It can be downloaded from http://www.portcullis-security.com/uplds/wildcard_attacks.pdf Majority of the Microsoft SQL Server based web applications are vulnerable to this attack. Other databases could be vulnerable depending on how the applications implement search functionalities although common implementation of the search functionality in SQL Server back-end applications is vulnerable. There are real world scenarios and detailed analysis in the paper which explains and shows the impact of this attack. Regards, -- Ferruh Mavituna


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top