ISC reader Mike wrote in to share an interesting new twist on the ongoing SQL injections. What he found in his logs was the following
POST /removed.asp HTTP/1.1
The injection itself (starting with DECLARE...) looks a lot like the technique used by ASPROX (see our earlier diary), but that the injection attempt here is made not via the URL but rather via a cookie is a new twist. Mike was able to capture the full code block:
DECLARE @T varchar(255),@C varchar(255),@X varchar(255) DECLARE Table_Cursor
While this again looks reasonably similar to the earlier injections, we haven't seen this particular form before. The URL has been defanged above, but is still live. It dishes out a handful of exploits, and in the end delivers a file called "x.exe" that looks like yet another password stealer, but has poor detection at this time (Virustotal). One of the exploits contains the string "I LOVE gameee TEAM". Well: We don't.
Please let us know if you see attempted SQL injection via cookies in your logs.
Sep 29th 2008
1 decade ago