Re: [exim] SQL Injection

Página superior
Eliminar este mensaje
Responder a este mensaje
Autor: Jakob Hirsch
Fecha:  
A: Adrian
Cc: exim-users
Asunto: Re: [exim] SQL Injection
Adrian wrote:

> By having
> server_condition = ${if crypteq {$3}{${lookup pgsql {SELECT password FROM users WHERE username='$2'}}}{yes}{no}}
> in the authenticator it was possible for me to execute a bad SQL query
> by sending this username:
> test'; INSERT INTO valid_email_addresses VALUES ('adrian', 'evil@???'); SELECT '


${quote_mysql:

> Is there a way to prevent this except by disabling write access for
> ths database user (which is certainly not a way to circumvent sql


It's always a good idea to have a database user with only the required
rights.