Re: [exim] SQL Injection

Top Page
Delete this message
Reply to this message
Author: Jakob Hirsch
Date:  
To: Adrian
CC: exim-users
Subject: Re: [exim] SQL Injection
Adrian wrote:

> By having
> server_condition = ${if crypteq {$3}{${lookup pgsql {SELECT password FROM users WHERE username='$2'}}}{yes}{no}}
> in the authenticator it was possible for me to execute a bad SQL query
> by sending this username:
> test'; INSERT INTO valid_email_addresses VALUES ('adrian', 'evil@???'); SELECT '


${quote_mysql:

> Is there a way to prevent this except by disabling write access for
> ths database user (which is certainly not a way to circumvent sql


It's always a good idea to have a database user with only the required
rights.