Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

PHP sql security

0
0

I use mysql_real_escape_string() on my variables, but looking through my logs I noticed a stream of input from someone with entries like this:

${@print(md5(acunetix_wvs_security_test))} 1\" or (sleep(4)+1) limit 1 --

and so on. A huge list of them.

Is he just attempting and nothing happening? Or is my code not safe with just mysql_real_escape_string() ?

EDIT: I can't see any damage, but most of the input area's on the site have been attempted many many times. Wouldn't he have stopped if it didn't work once, realizing it was secure?

These entries come from an Acunetix Web Vulnerability Scanning (see http://www.acunetix.com/vulnerability-scanner/ for more details).

In short this is just a robot that runs over your site and tests for known security issues. As to your question, he is just attempting. Even if your site would be vulnerably, the scanner would not try to break anything, just report the vulnerabilities to the person testing.

Maybe it is a good idea to check the logs again later, because the automatic scan may be an automated information gathering of someone, who then tries to attack your site manually, with the information he got from the automatic scan. But I dont know how critical your application is.

EDIT: No, the scanner would not have stopped. These scanners are not very smart and do not try to learn from previous results. They only work through a list of defined attacks and try them on every input/parameter they can find.


Viewing all articles
Browse latest Browse all 12749

Latest Images

Trending Articles





Latest Images