SANS is reporting a new wave of the mass SQL injection automated attack against MS ASP + MS SQL Server web sites.

To my surprise and disappoint, first commenter on the SANS diary entry wrote:

If you're using Firefox, exploited sites may reach out and "touch" you even before you look at cached pages, unless you've manually disabled "network.prefetch-next" in "about:config" Check out http://www.google.com/help/features.html#prefetch for more information.

Such a statement is either misleading or plain wrong (depending on what you mean by "touch"), since no remote code gets executed when pages are prefetched: the raw content is are just stored in cache for faster access, and cannot do any harm.
Furthermore, if you're using Firefox you're immune from exploits targeted to Internet Explorer vulnerabilities, which are a very common payload, and if you're running NoScript you won't be "touched" by any part of this attack: the initial malicious script of the chain is prevented from loading, and even if it wasn't, the plugin-based exploitation attempts would have been blocked anyway.

On a side note, I've updated the post-mortem cleanup SQL script I attached with no guarantee in my previous post for site administrators, after reader Scott reported that it was not working properly. Now it's debugged and "tested" on SQL Server 2005 (should work on other versions as well).

But again: if you own a web site, a serious code review to eliminate SQL injection opportunities is mandatory, unless you want your site to get reinfected on next round. It's happening right now...

Comments are closed.

Bad Behavior has blocked 969 access attempts in the last 7 days.