| Bug #22243 | Unicode SQL Injection Exploit | ||
|---|---|---|---|
| Submitted: | 11 Sep 2006 18:44 | Modified: | 7 Jul 2009 17:05 |
| Reporter: | Bryan Livingston | Email Updates: | |
| Status: | Duplicate | Impact on me: | |
| Category: | Connector / NET | Severity: | S2 (Serious) |
| Version: | 1.0.2445.20017 | OS: | Windows (Windows XP) |
| Assigned to: | CPU Architecture: | Any | |
| Tags: | Exploit, Injection, Unicode | ||
[11 Sep 2006 18:44]
Bryan Livingston
[11 Sep 2006 19:03]
Bryan Livingston
A better encoder is probably. This is very simmilar but may have better support for the euro sign or may perform better.
private static Encoding encoder = Encoding.Default; // default windows code page (1252)
And from the disassemble code of the Encoding.Default, it use the following
code logic:
===========
private static Encoding CreateDefaultEncoding()
{
int num1 = Win32Native.GetACP();
if (num1 == 0x4e4)
{
return new SBCSCodePageEncoding(num1);
}
return Encoding.GetEncoding(num1);
}
===========
[18 Sep 2006 7:46]
Tonci Grgin
Hi Bryan, can you please recheck answers posted by Reggie in BUG#10870 and get back with results?
[18 Oct 2006 23:00]
Bugs System
No feedback was provided for this bug for over a month, so it is being suspended automatically. If you are able to provide the information that was originally requested, please do so and change the status of the bug back to "Open".
[7 Jul 2009 17:05]
Reggie Burnett
this is the same bug as bug #45941 which is getting fixed in 5.1.8+, 5.2.7+, and 6.0.5+
