Aug 28th, 2014, 4:59 AM
We recently failed our PCI compliance scan and one of the failure items was referred to an SQL injection vulnerability (I've posted the full text of the failure below). The only SQL script we're using is formtools, so I'm guessing that's the source.
We aren't using the API -- so maybe that's the issue -- and that's my question: Does the Formtools API have the necessary cleansing routines built in? Will using the FT API resolve this?
Thanks,
John
And here's the text that the PCI compliance drone spit out:
xxx.xxx.xx.xxx:2087/tcp Blind SQL injection vulnerability in locale
parameter to /.
(I x'd out the IP address)
When a web application uses user- supplied input parameters within SQL queries without first checking them for unexpected characters, it becomes possible for an attacker to manipulate the query.
We aren't using the API -- so maybe that's the issue -- and that's my question: Does the Formtools API have the necessary cleansing routines built in? Will using the FT API resolve this?
Thanks,
John
And here's the text that the PCI compliance drone spit out:
xxx.xxx.xx.xxx:2087/tcp Blind SQL injection vulnerability in locale
parameter to /.
(I x'd out the IP address)
When a web application uses user- supplied input parameters within SQL queries without first checking them for unexpected characters, it becomes possible for an attacker to manipulate the query.