{"id":811,"date":"2008-07-22T00:58:00","date_gmt":"2008-07-22T00:58:00","guid":{"rendered":"http:\/\/atumvirtwordpress.azurewebsites.net\/?p=811"},"modified":"2008-07-22T00:58:00","modified_gmt":"2008-07-22T00:58:00","slug":"sql-injection-hit","status":"publish","type":"post","link":"https:\/\/avtempwp.azurewebsites.net\/2008\/07\/sql-injection-hit\/","title":{"rendered":"SQL Injection Hit"},"content":{"rendered":"
<\/a> Our attention turned to what had actually caused the issue. This was complicated by the fact that the content is actually designed and maintained by an outside vendor and done in Cold Fusion. After tracking down the web server and examining the malicious code (thanks to the “NoScript” extention in Firefox) I found that the URL that was attempting to serve out the malware was down already. This was at least a little bit of good news. Upon searching the web and contacting the vendor, we ran across threads that suggested other Cold Fusion users were being hit by a similar attack. Apparently the attack was similar to the one that occured last Februrary<\/a>, in which several hundred thousand pages appeared compromised. This attack is easily defeated by validating all input, and there is even a Cold Fusion parameter to do this that needed to be set.<\/p>\n The comic up top about sums up my feelings on the subject. By 3:40, the database had been cleaned of the malicious code and all necessary inputs had been flagged for validation. The matter wasn’t helped by the fact that this particular web server is still running Windows 2000 and a 4 year old version of Cold Fusion. When I mentioned this fact, management seemed gleeful at the prospect of upgrading to Server 2008 pending compatibility checks with ColdFusion.<\/p>\n","protected":false},"excerpt":{"rendered":" Blast! Today I was rudely interrupted by a SQL injection attack on our main public facing web server. When I arrived this morning at 7:30, I promptly overheard the help desk folks alerting us to the fact that when we visited our website (which happened to be the default home page on most of our […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[52,53],"tags":[],"_links":{"self":[{"href":"https:\/\/avtempwp.azurewebsites.net\/wp-json\/wp\/v2\/posts\/811"}],"collection":[{"href":"https:\/\/avtempwp.azurewebsites.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/avtempwp.azurewebsites.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/avtempwp.azurewebsites.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/avtempwp.azurewebsites.net\/wp-json\/wp\/v2\/comments?post=811"}],"version-history":[{"count":0,"href":"https:\/\/avtempwp.azurewebsites.net\/wp-json\/wp\/v2\/posts\/811\/revisions"}],"wp:attachment":[{"href":"https:\/\/avtempwp.azurewebsites.net\/wp-json\/wp\/v2\/media?parent=811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/avtempwp.azurewebsites.net\/wp-json\/wp\/v2\/categories?post=811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/avtempwp.azurewebsites.net\/wp-json\/wp\/v2\/tags?post=811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
Blast! Today I was rudely interrupted by a SQL injection attack on our main public facing web server. When I arrived this morning at 7:30, I promptly overheard the help desk folks alerting us to the fact that when we visited our website (which happened to be the default home page on most of our enterprise PCs), users were experiencing a Symantec Anti-Virus popup saying that an attack had been stopped. We immediately took the site offline and popped up a nice “The web page is down” message on a new website and did the proper re-directions.<\/p>\n