28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Troubleshooting <strong>SQL</strong> <strong>Injection</strong> <strong>Attacks</strong><br />

References • Chapter 10 457<br />

˛˛<br />

When exploiting an <strong>SQL</strong> injection flaw using UNION SELECT you may<br />

encounter type clash errors when image data type columns are included within the<br />

original query. To overcome this common obstacle use UNION ALL SELECT.<br />

˛˛ Microsoft <strong>SQL</strong> Server supports stacked queries using the semicolon character to<br />

begin each new query.<br />

˛˛ The Oracle Database Server includes the utl_http package that you can use to<br />

establish outbound HTTP connections from the database server host. It is possible<br />

to abuse this package to extract database data via HTTP connections to any<br />

TCP port.<br />

<strong>SQL</strong> <strong>Injection</strong> on Other Platforms<br />

˛˛ The most commonly encountered database platforms are Microsoft <strong>SQL</strong> Server,<br />

Oracle, <strong>and</strong> My<strong>SQL</strong>. This chapter included an <strong>SQL</strong> injection cheat sheet for<br />

Postgre<strong>SQL</strong>, DB2, Informix, <strong>and</strong> Ingres databases.<br />

˛˛ It is possible to obtain remote comm<strong>and</strong> execution when exploiting a Postgre<strong>SQL</strong><br />

database by importing functions from an external library. Beginning in Version 8.2<br />

each imported library must contain the PG_MODULE_MAGIC macro.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!