Microsoft's U.K. Web site hit by SQL injection attack
Hacker exploits programming error to link Web page to external site
IDG News Service -
A hacker successfully defaced a page on Microsoft Corp.'s U.K. Web site on Wednesday, resulting in the display of several images, including a photograph of a child waving the flag of Saudi Arabia.
Roger Halbheer, Microsoft's chief security advisor in Europe, the Middle East and Africa, said today that the security hole used in the attack has since been closed. But, he said, it was "unfortunate" that the U.K. site was vulnerable in the first place.
The hacker, who posted his name as "rEmOtEr," used a SQL injection attack to exploit a programming snafu and gain unauthorized access to a database that supports the Web site, Halbheer said. The site takes SQL queries embedded in URLs and passes them to the database, he explained. By embedding a query of an unexpected form into the address for a particular Web page, the hacker prompted the server to return error messages, Halbheer said.
From such error messages, an attacker can get an idea of how a database is structured and refine a query so that the database will process it as an instruction to insert, instead of retrieve, data. In Microsoft's case, Halbheer said, the hacker eventually found the right combination and inserted a link to an external Web site into the database.
When users accessed the Web page on Microsoft's site, the database downloaded two photos and a graphic from the external site. A screenshot of the defacement was posted on the Zone-H.org Web site, which tracks hacked sites.
There are two ways Microsoft could have avoided this type of attack, according to Halbheer. First, the database should not have been allowed to return error messages, he said. In addition, the Web application should have validated the external URL that the hacker entered into the database and rejected it. If a programmer makes a mistake, "the bad guy can leverage it," Halbheer said.
SQL injection attacks are on the rise as attackers try to get at valuable information that is held within databases, said Paul Davie, founder and chief operating officer of Secerno Ltd., an Oxford, England-based vendor that develops technology designed to protect databases from such attacks.
"I don't think Microsoft [is] unique in this respect, and [they] shouldn't be held up as particularly slipshod," Davie said. "This could have happened to practically anybody."
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- PCI 3.0 Compliance In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint devices.
- Mitigating Security Risks at the Networks Edge This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
- 5 Strategies for Modern Data Protection Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!