DoS attacks using SQL Wildcards - White Paper

2008.05.21
Risk: Low
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.8/10
Znaczenie: 6.9/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Brak
Wpływ na dostępność: Pełny

This paper discusses abusing Microsoft SQL Query wildcards to consume CPU in database servers using only the search field present in most common web applications. It can be downloaded from http://www.portcullis-security.com/uplds/wildcard_attacks.pdf Majority of the Microsoft SQL Server based web applications are vulnerable to this attack. Other databases could be vulnerable depending on how the applications implement search functionalities although common implementation of the search functionality in SQL Server back-end applications is vulnerable. There are real world scenarios and detailed analysis in the paper which explains and shows the impact of this attack. Regards, -- Ferruh Mavituna


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top