An In-Depth Look at SQL Injection

SQL injection attacks are one of the most common techniques hackers use to access secure information from web servers to carry out illegitimate activities.  This hacking technique also demonstrates how vulnerable systems are on not just the insecure ports and other firewall protected fronts, but on HTTP port 80, as well as the user-input nature […]

Read More →

Acunetix WVS Version 6.5 build 20091215 released

An updated build for Acunetix WVS Version 6.5 has been released with a number of improvements, bug fixes, and a number of new security checks. New security checks: JBoss BSHDeployer MBean JBoss checks from RedTeam’s paper JBoss HttpAdaptor JMXInvokerServlet JBoss Server MBean JBoss ServerInfo MBean JBoss Web Console JMX Invoker phpShop v0.8.1 Multiple Vulnerabilities Invision […]

Read More →

AcuSensor, curl and Zen Cart

Recently we’ve released a new build, build number 20091124. This build includes a new AcuSensor check named “curl_exec() url is controlled by user”. This new check will verify if the user can control the URL passed to curl_exec. In case you are not familiar with curl, below is a short abstract about curl taken from PHP’s manual: PHP supports […]

Read More →

Changes coming to the OWASP Top 10 in 2010

In the spirit of improving Web application security worldwide the folks at OWASP have released the OWASP Top 10 2010 “release candidate”. It’s currently open for comments and scheduled for final release the first quarter of next year. The biggest change you’ll see in this latest incarnation of the Top 10 is they’re now taking […]

Read More →

Acunetix WVS Version 6.5 build 20091124 released

An updated build for Acunetix WVS Version 6.5 has been released with a number of improvements, bug fixes, and most important of all, a good number of new security checks. New: New security checks of AcuSensor Technology curl_exec() url is controlled by user PHP preg_replace used on user input PHP super-globals-overwrite PHP unserialize used on […]

Read More →

PHP "multipart/form-data" denial of service

PHP version 5.3.1 was just released. This release contains a patch for a denial of service condition we’ve reported some time ago. The problem is related with PHP’s handling of RFC 1867 (Form-based File Upload in HTML). When you send a POST request to a PHP script with the content-type of “multipart/form-data” and include a […]

Read More →

Why bother with PCI/DSS compliance?

As reported previously on a thewhir.com blog post there seems to be a growing debate about the true ‘value’ of the PCI/DSS standard. Indeed, we have been following a rather large thread on linkedin.com as well that is discussing the value of PCI in regards to the recent Network Solutions, Inc. disclosure that they had […]

Read More →

Looking back at 2009 through SQL Injection goggles

The earliest public mention I could find of SQL Injection (‘piggybacking SQL statements’ as the author put it) was from someone who called himself Rain Forest Puppy (RFP). In 1998 RFP wrote an article for Phrack Magazine (Volume 9, Issue 54) in which he talks about ‘NT Web Technology Vulnerabilities’. However I suspect the vulnerability […]

Read More →