Flutterby™! : Perl Jam

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

Perl Jam

2015-01-08 02:22:10.524989+01 by Dan Lyke 0 comments

Whoah: Perl Jam: Exploiting a 20 year old vulnerability.

PDF of the slides, but....

The short version: $cgi->param(...) can return an array. Nothing you didn't know there. Here's the scary bit:

$dbh->quote(...) can take an additional type argument, which will make it skip quoting(!).

This means instant SQL injection vulnerability for code which does $dbh->quote($cgi->param(...)).

Gulp.

Flutterby code has been patched, will push

[ related topics: Politics Perl Open Source Journalism and Media Video Databases hubris ]

comments in descending chronological order (reverse):

Comment policy

We will not edit your comments. However, we may delete your comments, or cause them to be hidden behind another link, if we feel they detract from the conversation. Commercial plugs are fine, if they are relevant to the conversation, and if you don't try to pretend to be a consumer. Annoying endorsements will be deleted if you're lucky, if you're not a whole bunch of people smarter and more articulate than you will ridicule you, and we will leave such ridicule in place.


Flutterby™ is a trademark claimed by

Dan Lyke
for the web publications at www.flutterby.com and www.flutterby.net.