ISC reader Mike wrote in to share an interesting new twist on the ongoing SQL injections. What he found in his logs was the following POST /removed.asp HTTP/1.1 The injection itself (starting with DECLARE...) looks a lot like the technique used by ASPROX (see our earlier diary), but that the injection attempt here is made not via the URL but rather via a cookie is a new twist. Mike was able to capture the full code block: DECLARE @T varchar(255),@C varchar(255),@X varchar(255) DECLARE Table_Cursor While this again looks reasonably similar to the earlier injections, we haven't seen this particular form before. The URL has been defanged above, but is still live. It dishes out a handful of exploits, and in the end delivers a file called "x.exe" that looks like yet another password stealer, but has poor detection at this time (Virustotal). One of the exploits contains the string "I LOVE gameee TEAM". Well: We don't. Please let us know if you see attempted SQL injection via cookies in your logs. |
Daniel 385 Posts ISC Handler Sep 29th 2008 |
Thread locked Subscribe |
Sep 29th 2008 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!