View Menu

Technical Support Forums

Free, outstanding support from WebAssist and your colleagues

DataAssist Multiple Add to DB Vunerability

Thread began 12/15/2009 12:09 pm by Dave Buchholz | Last modified 12/15/2009 8:07 pm by Dave Buchholz | 295 views | 6 replies

Dave BuchholzBeta Tester

DataAssist Multiple Add to DB Vunerability

I have an issue with a page that appears to be vunerable to SQL Injection which uses the WA DataAssist Multiple Inserts Server Behaviour.

I have set up this page and attached a zip file containing the page in question.

You need to have the Firefox Tools on this page installed and then visit the url above and run the SQL Inject Me Report (I have attached a screenshot of the results I got) and you will see what I consider to be an alarming set of results.

A couple of observations, in the helper file for DataAssist there are a couple of lines of code that I think need revising

line 143: $formVal = "'".((!(preg_match("/(^|[^\\\\])'/", $formVal))) ? $formVal : addslashes($formVal))."'";

line 186: $formVal = "'".((!(preg_match("/(^|[^\\\\])'/", $formVal))) ? $formVal : addslashes($formVal));

I believe that using mysql_real_escape_string($formVal) would be a better method of escaping this value but even doing that leaves this page vulnerable so there is obviously a more deep rooted problem here with the code.

I have posted this here rather than in the public forum so that we can have a reasoned discussion about this issue and I would appreciate it if other WCE's did not publicize the url I have created as this is a current project that is ongoing at the moment.

Build websites with a little help from your friends

Your friends over here at WebAssist! These Dreamweaver extensions will assist you in building unlimited, custom websites.

Build websites from already-built web applications

These out-of-the-box solutions provide you proven, tested applications that can be up and running now.  Build a store, a gallery, or a web-based email solution.

Want your website pre-built and hosted?

Close Windowclose

Rate your experience or provide feedback on this page

Account or customer service questions?
Please user our contact form.

Need technical support?
Please visit support to ask a question





Ease of use


security code refresh image

We do not respond to comments submitted from this page directly, but we do read and analyze any feedback and will use it to help make your experience better in the future.

Close Windowclose

We were unable to retrieve the attached file

Close Windowclose

Attach and remove files

add attachmentAdd attachment
Close Windowclose

Enter the URL you would like to link to in your post

Close Windowclose

This is how you use right click RTF editing

Enable right click RTF editing option allows you to add html markup into your tutorial such as images, bulleted lists, files and more...

-- click to close --

Uploading file...