lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4E8A4580.4020500@census.gr> Date: Tue, 04 Oct 2011 02:30:08 +0300 From: Dimitris Glynos <dimitris@...sus.gr> To: bugtraq@...urityfocus.com Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Netvolution referer header SQL injection vulnerability On 10/03/2011 01:47 PM, Dimitris Glynos wrote: > As header field values are normally not included in HTTP transaction > logs, an attack based on this vulnerability may go unnoticed by web > server administrators. A correction: Although most header fields are not normally included in HTTP transaction logs, the referer one usually is. Hence the above argument holds true only for web servers with minimal logging setups (e.g. IIS 6.0 using IIS Log File Format). Cheers, Dimitris _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists