I would accuse Huck's Army, but we all know they aint smart enough to pull off something like this.![]()
God wouldn't do that.
I would accuse Huck's Army, but we all know they aint smart enough to pull off something like this.![]()
if they successfully hacked it they would have made much more drastic changes to the amount displayed. IF they were trying to decrease it, they would have REALLY decreased it, and same if they were trying to increase it.
Gnerally speaking RP has some of the best Tech people around. There is no way in hell they'd leave a hole for a SQL injection attack. That's just amature shit.
Don't worry people, computers (and users) under stress can do wiered things. I've seen it all before, they can usually be explained and they're usually harmless.
7 year computer programmer here. ANYWHERE where you submit data in an application has the potential for a SQL injection if you DON'T code against it. You as a Database Admin might also have some power over stopping this, but ultimately it is a proactive solution on either end. YOU may protect your databases from attack, but that does not equate to automatic protection.
That being said, from the snippet shown, I would imagine the scenario already mentioned where the parse character was included in the State field on the submission form was the actual cause.
but could someone capture all the names?
7 year computer programmer here. ANYWHERE where you submit data in an application has the potential for a SQL injection if you DON'T code against it.
I find it highly UNLIKELY that the flash object is going to accept input characters and be tied to the actual donor database, where this would be a risk. If the programmer allowed that, they should be fired.
More likely: The character seperater they use for the "latest donors" input string was screwed up. ie: somebody submitted a name that had the same character as they use to seperate the data.
SQL injection works when you allow user data to be submitted and executed in some way. The flash widget does not take data. It pushes out data.
If anything it, it would have been a sql injection attack via the submission form, not the widget.
Edit: Nothing to worry about here. This is 11 years of programming experience talking.
the db probably exports an xml file to the widget using some sort of web service. garaunteed there is a layer between the db and the widget. the widget probably never even gets close to the db.
but could someone capture all the names?
Agreed. I've seen some stuff happen because people just assumed that since it was a reliable application, there were no problems. Saw a case of SQL injection in a minor intranet product that allowed someone to login as a superuser. Thank goodness it was behind the firewall and only available to company people. It was fixed rather quickly though once found.Thank you (13 year programmer myself). People here seem to think a lot of goofy things about how secure their data is because the "professionals" are on the job. The real professionals know that screw ups are very common, especially when under constant, absurd deadlines to get things done. I'm not saying that anything happened here, but you're being naive if you thing there's nothing to worry about.
0 years programmer here.
Ya'll are impressive with this discussion.