Closed GoogleCodeExporter closed 8 years ago
Hello,
Even we are not really interested into asp/iis security, a 2-lines patch is
coming within minutes ;)
Original comment by ori...@gmail.com
on 26 Mar 2013 at 2:30
Patch is commited,
Regarding the vulnerability, the exploitation window is limited to quote less
SQL injections with two field (max) selected.
The attack can be used to bypass filtering on SQL keywords (mostly, or only),
but naxsi will still match on other characters, so even without the patch, a :
--------------------------------------------
bla u%nion s%elect foo,bar,baz fr%om bar
--------------------------------------------
or a
--------------------------------------------
bla' ...
--------------------------------------------
will be still catched (as naxsi matches as well on quotes, commas etc.)
Original comment by ori...@gmail.com
on 26 Mar 2013 at 2:57
some keywords such as and with %and could bypass too, %and union s%elect a
from b
Original comment by Saf...@gmail.com
on 27 Mar 2013 at 2:49
I appreciate your soon response to fix it.Naxsi is a nice project,hope it will
be better.
Original comment by Saf...@gmail.com
on 27 Mar 2013 at 2:52
Original issue reported on code.google.com by
noloa...@gmail.com
on 26 Mar 2013 at 2:27