Injection hack - Please help!

Injection hack - Please help!

am 05.10.2005 17:54:30 von jason

A number of our online forms with client side JS validation appear to have
been the subject of a 'injection' hack but I am novice of the reperucussions
or exact meaning of what is going on here.

Somebody appears to be cycling through all our online forms and and
inserting strange code. Some of these forms are connected to our database.

Could anybody tell me how serious this is and what I can do to deal with
present threat. I am not sure what to do here.....

Here is what we are getting:



Source:
[url=http://www.imq.cn]ÊÓƵÁÄÌìÊÒ[/url]¡¢[url=http://www.koo t.cn]Ó¢ÓïÅàѵ[/url]¡¢[url=http://www.kood.cn]·§ÃÅ[/url]¡¢[ur l=http://www.bomm.cn]´¥ÃþÆÁ±¨¼Û[/url]¡¢[url=http://www.seegl e.com]ÊÓƵ»áÒéÈí¼þϵͳ[/url]

IDStatus: ADVERTISER







//------------- Personal Details ------------//



Email Address: abc@hotmail.com

First Name: adname

Last Name: adname

Country: 020-78907890

Cell:

Zip:

State:

Country:







//------------- Service ------------//



Service Details:
[url=http://www.imq.cn]ÊÓƵÁÄÌìÊÒ[/url]¡¢[url=http://www.koo t.cn]Ó¢ÓïÅàѵ[/url]¡¢[url=http://www.kood.cn]·§ÃÅ[/url]¡¢[ur l=http://www.bomm.cn]´¥ÃþÆÁ±¨¼Û[/url]¡¢[url=http://www.seegl e.com]ÊÓƵ»áÒéÈí¼þϵͳ[/url]

Re: Injection hack - Please help!

am 05.10.2005 19:48:43 von Steven Burn

The implications are obvious..... you need to re-think your coding (locking
down forms from external abuse is your first step)

As this is a Client-side issue (JS), you'd need to go to a JS newsgroup for
information on how to go about this.

microsoft.public.scripting.jscript
comp.lang.javascript

--
Regards

Steven Burn
Ur I.T. Mate Group
www.it-mate.co.uk

Keeping it FREE!

wrote in message
news:uuPBYUcyFHA.2812@TK2MSFTNGP14.phx.gbl...
> A number of our online forms with client side JS validation appear to have
> been the subject of a 'injection' hack but I am novice of the
reperucussions
> or exact meaning of what is going on here.
>
> Somebody appears to be cycling through all our online forms and and
> inserting strange code. Some of these forms are connected to our database.
>
> Could anybody tell me how serious this is and what I can do to deal with
> present threat. I am not sure what to do here.....
>
> Here is what we are getting:
>
>
>
> Source:
>
[url=http://www.imq.cn]ÊÓƵÁÄÌìÊÒ[/url]¡¢[url=http://www.koo t.cn]Ó¢ÓïÅàѵ[/u
rl]¡¢[url=http://www.kood.cn]·§ÃÅ[/url]¡¢[url=http://www.bom m.cn]´¥ÃþÆÁ±¨¼Û[
/url]¡¢[url=http://www.seegle.com]ÊÓƵ»áÒéÈí¼þϵͳ[/url]
>
> IDStatus: ADVERTISER
>
>
>
>
>
>
>
> //------------- Personal Details ------------//
>
>
>
> Email Address: abc@hotmail.com
>
> First Name: adname
>
> Last Name: adname
>
> Country: 020-78907890
>
> Cell:
>
> Zip:
>
> State:
>
> Country:
>
>
>
>
>
>
>
> //------------- Service ------------//
>
>
>
> Service Details:
>
[url=http://www.imq.cn]ÊÓƵÁÄÌìÊÒ[/url]¡¢[url=http://www.koo t.cn]Ó¢ÓïÅàѵ[/u
rl]¡¢[url=http://www.kood.cn]·§ÃÅ[/url]¡¢[url=http://www.bom m.cn]´¥ÃþÆÁ±¨¼Û[
/url]¡¢[url=http://www.seegle.com]ÊÓƵ»áÒéÈí¼þϵͳ[/url]
>
>

Re: Injection hack - Please help!

am 05.10.2005 20:06:20 von reb01501

jason@catamaranco.com wrote:
> A number of our online forms with client side JS validation appear to

Validation needs to be done at the server, even if it was "already done" in
the client, as you have just discovered.

If this is a SQL Injection* attack (I'm not sure that it is) then you need
to rethink your use of dynamic sql and use parameters instead**.


Bob Barrows

* http://www.sqlsecurity.com/DesktopDefault.aspx?tabid=23
http://www.nextgenss.com/papers/advanced_sql_injection.pdf
http://www.nextgenss.com/papers/more_advanced_sql_injection. pdf
http://www.spidynamics.com/papers/SQLInjectionWhitePaper.pdf

** Using Command object:
http://groups-beta.google.com/group/microsoft.public.inetser ver.asp.db/msg/72e36562fee7804e

SQL Server Stored Procedures:
http://tinyurl.com/jyy0

Access Saved Queries:
http://groups.google.com/groups?hl=en&lr=&ie=UTF-8&c2coff=1& selm=eHYxOyvaDHA.4020%40tk2msftngp13.phx.gbl

http://groups.google.com/groups?hl=en&lr=&ie=UTF-8&c2coff=1& selm=ukS%246S%247CHA.2464%40TK2MSFTNGP11.phx.gbl

http://www.google.com/groups?selm=eETTdnvFDHA.1660%40TK2MSFT NGP10.phx.gbl&oe=UTF-8&output=gplain

http://www.google.com/groups?hl=en&lr=&ie=UTF-8&oe=UTF-8&sel m=e6lLVvOcDHA.1204%40TK2MSFTNGP12.phx.gbl



--
Microsoft MVP -- ASP/ASP.NET
Please reply to the newsgroup. The email account listed in my From
header is my spam trap, so I don't check it very often. You will get a
quicker response by posting to the newsgroup.

Re: Injection hack - Please help!

am 05.10.2005 20:47:16 von jason

Ok, I most do use parametized procedure calls.

Thanks.

"Bob Barrows [MVP]" wrote in message
news:%23hYQAedyFHA.1032@TK2MSFTNGP12.phx.gbl...
> jason@catamaranco.com wrote:
>> A number of our online forms with client side JS validation appear to
>
> Validation needs to be done at the server, even if it was "already done"
> in
> the client, as you have just discovered.
>
> If this is a SQL Injection* attack (I'm not sure that it is) then you need
> to rethink your use of dynamic sql and use parameters instead**.
>
>
> Bob Barrows
>
> * http://www.sqlsecurity.com/DesktopDefault.aspx?tabid=23
> http://www.nextgenss.com/papers/advanced_sql_injection.pdf
> http://www.nextgenss.com/papers/more_advanced_sql_injection. pdf
> http://www.spidynamics.com/papers/SQLInjectionWhitePaper.pdf
>
> ** Using Command object:
> http://groups-beta.google.com/group/microsoft.public.inetser ver.asp.db/msg/72e36562fee7804e
>
> SQL Server Stored Procedures:
> http://tinyurl.com/jyy0
>
> Access Saved Queries:
> http://groups.google.com/groups?hl=en&lr=&ie=UTF-8&c2coff=1& selm=eHYxOyvaDHA.4020%40tk2msftngp13.phx.gbl
>
> http://groups.google.com/groups?hl=en&lr=&ie=UTF-8&c2coff=1& selm=ukS%246S%247CHA.2464%40TK2MSFTNGP11.phx.gbl
>
> http://www.google.com/groups?selm=eETTdnvFDHA.1660%40TK2MSFT NGP10.phx.gbl&oe=UTF-8&output=gplain
>
> http://www.google.com/groups?hl=en&lr=&ie=UTF-8&oe=UTF-8&sel m=e6lLVvOcDHA.1204%40TK2MSFTNGP12.phx.gbl
>
>
>
> --
> Microsoft MVP -- ASP/ASP.NET
> Please reply to the newsgroup. The email account listed in my From
> header is my spam trap, so I don't check it very often. You will get a
> quicker response by posting to the newsgroup.
>
>

Re: Injection hack - Please help!

am 05.10.2005 20:48:22 von jason

Ok, I was also concerned with implications for existing sql server database.

Will try that group.

Danke

"Steven Burn" wrote in message
news:uO94KUdyFHA.3860@TK2MSFTNGP09.phx.gbl...
> The implications are obvious..... you need to re-think your coding
> (locking
> down forms from external abuse is your first step)
>
> As this is a Client-side issue (JS), you'd need to go to a JS newsgroup
> for
> information on how to go about this.
>
> microsoft.public.scripting.jscript
> comp.lang.javascript
>

Re: Injection hack - Please help!

am 05.10.2005 21:10:24 von reb01501

In that case, you may be facing a cross-site scripting (XSS) hack. Google
should get you some info about this.

Again, the solution is to validate server-side. Never depend on client-side
validation. Use client-side validation to improve the user "experience". Use
server-side validation to lock down your application.

Bob Barrows
jason@catamaranco.com wrote:
> Ok, I most do use parametized procedure calls.
>
> Thanks.
>
> "Bob Barrows [MVP]" wrote in message
> news:%23hYQAedyFHA.1032@TK2MSFTNGP12.phx.gbl...
>> jason@catamaranco.com wrote:
>>> A number of our online forms with client side JS validation appear
>>> to
>>
>> Validation needs to be done at the server, even if it was "already
>> done" in
>> the client, as you have just discovered.
>>
>> If this is a SQL Injection* attack (I'm not sure that it is) then
>> you need to rethink your use of dynamic sql and use parameters
>> instead**.
>>

--
Microsoft MVP -- ASP/ASP.NET
Please reply to the newsgroup. The email account listed in my From
header is my spam trap, so I don't check it very often. You will get a
quicker response by posting to the newsgroup.

Re: Injection hack - Please help!

am 12.10.2005 03:42:45 von jeff.nospam

It's not a hack at all. It's a spamming robot filling in ad links as
form entries. You should be stripping the HTML from the input on the
server, as well as the extended character set if you don't want to
allow those into your data. You may want to record IP addresses of
anyone entering data as a means to track this and if needed, pursue
litigation.

Jeff

On Wed, 5 Oct 2005 11:54:30 -0400, wrote:

>A number of our online forms with client side JS validation appear to have
>been the subject of a 'injection' hack but I am novice of the reperucussions
>or exact meaning of what is going on here.
>
>Somebody appears to be cycling through all our online forms and and
>inserting strange code. Some of these forms are connected to our database.
>
>Could anybody tell me how serious this is and what I can do to deal with
>present threat. I am not sure what to do here.....
>
>Here is what we are getting:
>
>
>
>Source:
>[url=http://www.imq.cn]ÊÓƵÁÄÌìÊÒ[/url]¡¢[url=http://www.ko ot.cn]Ó¢ÓïÅàѵ[/url]¡¢[url=http://www.kood.cn]·§ÃÅ[/url]¡¢[u rl=http://www.bomm.cn]´¥ÃþÆÁ±¨¼Û[/url]¡¢[url=http://www.seeg le.com]ÊÓƵ»áÒéÈí¼þϵͳ[/url]
>
>IDStatus: ADVERTISER
>
>
>
>
>
>
>
>//------------- Personal Details ------------//
>
>
>
>Email Address: abc@hotmail.com
>
>First Name: adname
>
>Last Name: adname
>
>Country: 020-78907890
>
>Cell:
>
>Zip:
>
>State:
>
>Country:
>
>
>
>
>
>
>
>//------------- Service ------------//
>
>
>
>Service Details:
>[url=http://www.imq.cn]ÊÓƵÁÄÌìÊÒ[/url]¡¢[url=http://www.ko ot.cn]Ó¢ÓïÅàѵ[/url]¡¢[url=http://www.kood.cn]·§ÃÅ[/url]¡¢[u rl=http://www.bomm.cn]´¥ÃþÆÁ±¨¼Û[/url]¡¢[url=http://www.seeg le.com]ÊÓƵ»áÒéÈí¼þϵͳ[/url]
>