著者: Jakob Hirsch 日付: To: Adrian CC: exim-users 題目: Re: [exim] SQL Injection
Adrian wrote:
> By having
> server_condition = ${if crypteq {$3}{${lookup pgsql {SELECT password FROM users WHERE username='$2'}}}{yes}{no}}
> in the authenticator it was possible for me to execute a bad SQL query
> by sending this username:
> test'; INSERT INTO valid_email_addresses VALUES ('adrian', 'evil@???'); SELECT '
${quote_mysql:
> Is there a way to prevent this except by disabling write access for
> ths database user (which is certainly not a way to circumvent sql
It's always a good idea to have a database user with only the required
rights.