this post was submitted on 24 Jan 2024
12 points (100.0% liked)

Cybersecurity - Memes

1796 readers
327 users here now

Only the hottest memes in Cybersecurity

founded 1 year ago
MODERATORS
 
top 22 comments
sorted by: hot top controversial new old
[–] ArbitraryValue@sh.itjust.works 6 points 7 months ago (1 children)

How to say you're vulnerable to code injection without saying you're vulnerable to code injection.

[–] tryptaminev@feddit.de 2 points 7 months ago* (last edited 7 months ago) (4 children)

Are they vulnerable though, if they already exclude it at the user input?

I yet have to learn SQL and is there a way to allow passwords with '); DROP TABLE... without being vulnerable to an injection?

nevermind i googled it, and there various ways to do so

[–] herrvogel@lemmy.world 2 points 7 months ago (1 children)

This still smells though. Why is the raw, plain text password string getting anywhere near database queries in the first place?

[–] cactusupyourbutt@lemmy.world 1 points 7 months ago

I doubt it is. they probably have a WAF that blocks these strings though and didnt want to bother reconfiguring it

[–] rtxn@lemmy.world 1 points 7 months ago* (last edited 7 months ago) (1 children)

Prepared statements, mostly. You define the query using variables, turn that query into a language-dependent object, assign values to those variables, then execute the statement. The values will be passed verbatim, without any parsing.

Or, since we're talking about a password, you could encode or encrypt it before inserting it into the query string. The fact that the website could be negatively affected by phrases in the cleartext password is very concerning.

[–] surewhynotlem@lemmy.world 3 points 7 months ago

At best, it means they're storing your password instead of just a salted hash. And that's horrible.

[–] akincisor@sh.itjust.works 1 points 7 months ago

I noticed that upper case select, drop etc are not prohibited.

Poorly implemented user input filters are not a valid solution to being vulnerable to injection.

[–] emergencyfood@sh.itjust.works 1 points 7 months ago (1 children)

No one in their right mind is storing plain text passwords, or letting them anywhere near the database.

You convert the password to a hash, and store that. And the hash will look nothing like the password the user typed.

[–] acetanilide@lemmy.world 1 points 7 months ago (1 children)

You're right. No one in their right mind would do that.

On the other hand, people not in their right mind often run things. Such as my old professional liability insurance. Which wrote the username and password in the yearly statements...

And also sent you the password through email if you forgot it...

Also you couldn't change it...

[–] BURN@lemmy.world 1 points 7 months ago

There was a popular companion app to a game I play that’s stored passwords as MD5 hashes for years and when they got hacked they were able to decrypt everything.

Bonus point, the app was released multiple years after md5 was cracked.

Developers (including myself) cannot be trusted to implement the correct process 100% of the time. It’s happened too many times for it to be a single person issue and has transcended into a problem with software engineers

[–] Matriks404@lemmy.world 4 points 7 months ago (1 children)

I don't believe this is real. This isn't real, right?

[–] ABasilPlant@lemmy.world 3 points 7 months ago

This is real - I took the screenshot myself.

[–] zqwzzle@lemmy.ca 3 points 7 months ago (1 children)

So they’re not hashing or salting the passwords too. Cool…

[–] Rednax@lemmy.world 1 points 7 months ago (1 children)

Which makes me want to try and insert a password of a few megabytes worth of text. Should be fine, since there is no max lenght defined, right?

[–] lars@lemmy.sdf.org 1 points 7 months ago

If there is no overwrought prohibition of something I know that at least in America that means it’s

  1. Affirmatively legal and
  2. Legislatively encouraged by the FREEE Act

So give ’em hell!

[–] fubarx@lemmy.ml 3 points 7 months ago

Obligatory Little Bobby Tables: https://xkcd.com/327/

And for those who feel like saying they've already seen it: https://xkcd.com/1053/

[–] bitwaba@lemmy.world 2 points 7 months ago

Little Bobby drop tables

[–] RizzRustbolt@lemmy.world 2 points 7 months ago

Oh BobbyTables, you little rapscallion...

[–] lobut@lemmy.ca 2 points 7 months ago

Looking at that I wouldn't be surprised if those rules are just client-side validation.

[–] PhlubbaDubba@lemm.ee 1 points 7 months ago

submits Drop Table as passphrase

Grabs popcorn

[–] EfreetSK@lemmy.world 1 points 7 months ago

We could still have some fun with ALTER TABLE

[–] Kyrgizion@lemmy.world 1 points 7 months ago

Didn't say anything about truncate!