There are numerous subtle variations in the way different database
platforms handle string manipulation and numeric computation, which you may
need to take account of when performing advanced attacks of this kind. An
excellent guide to these differences covering many different databases can be
found here:
http://sqlzoo.net/howto/source/z.dir/i08fun.xml
In a variation on this situation, the authors have encountered cases in which
what is returned by the application is not an actual number, but some resource
for which that number is an identifier. The application performs a SQL query
based on user input, obtains a numeric identifier for a document, and then
returns the document’s contents to the user. In this situation, an attacker can
first obtain a copy of every document whose identifiers are within the relevant
Do'stlaringiz bilan baham: |