Myth or reality? This paper at imperva.com shows how relatively simple techniques can be used to automatically find and attack vulnerable application servers. Looks plausible enough to me.
You’ve been warned: use a serious framework for your next project ;-)
This entry was posted on Wednesday, March 31st, 2004 at 8:00 am and is filed under The Web. You can follow any responses to this entry through the RSS 2.0 feed.
Both comments and pings are currently closed.
Well, even if Cocoon doesn’t have some of the wide-open holes that some systems have, protecting from SQL injection is not built into the framework and requires careful inspection of direct transmission of request parameters to SQL queries…
Anyway, thanks for the pointers, this is an interesting read!
cat myself | sort | head -2
Bertrand Delacrétaz here - my "résumé" will tell you more.
The opinions expressed here are my own, I'm not representing any group or company on this blog. YMMV.
Submit a funky abstract. Conference accepts it. Haha, boy, now you have to deliver! I'll be live (remotely) with "T… twitter.com/i/web/status/1…3 days ago
@gaelhurlimann Ca fait quand même beaucoup penser au "cloud souverain" français qui n'a pas été fantastique... 5 days ago
RT @AdobeExpCloud: Register now for Adobe Developers Live: Content and join a diverse group of developers and experience builders for impor… 6 days ago
RT @OpenSourceOrg: #OSI seeks to hire an Executive Director. This is a full-time, permanent position, reporting to the Board of Directors,… 1 week ago
Well, even if Cocoon doesn’t have some of the wide-open holes that some systems have, protecting from SQL injection is not built into the framework and requires careful inspection of direct transmission of request parameters to SQL queries…
Anyway, thanks for the pointers, this is an interesting read!