Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...url query string attacksurl query string attacks
Previous
 
Next
New Post
10/13/2008 3:04 PM
 

I only see these types of queries come from certain IP addresses and I really don't think their done on a legit basis.  For example.  The IDS system monitored 3,500 requests and this request never once came up.  I also had the training database analyze my IP addresses activity for days and never once did I nor any of the 20 other people who access the site from my IP address ever trigger this alert.  Every day or two I see a request like this appear, however, it comes from remote IP sources.  I can't generate this request myself...  Also, if a local module of my site generated this request wouldn't the source IP be the same as my web server?

 
New Post
10/14/2008 1:39 PM
 

youre correct, a local module would have a local IP. I'm not sure what's causing these then, they're harmless as they're invalid requests anyway.

Cathal


Buy the new Professional DNN7: Open Source .NET CMS Platform book Amazon US
 
New Post
10/14/2008 6:08 PM
 

gopher_49 wrote
 

I beleive [sic] complete syntax would look like this: /ScriptResource.axd;d=cenhN4ktOA1l4wDDifyrsqd7xbDUCr5pmcTM1-AVDNlz30093Un6-Yf6K-

What resource is delivered when you convert the mal-formed querystring into a valid one (by changing the semicolon to a question mark)?  Is it possible that some third party has an improperly formed link pointing to this resource?  Do the requests contain a referrer?

Brandon


Brandon Haynes
BrandonHaynes.org
 
New Post
10/14/2008 11:53 PM
 

Usually a query string injection attack contains URL encoded ascii characters, but the example given above looks more like it is base64 encoded.  For an attack to work it has to be something that can be understood by the webserver without any explicit conversions.  So it looks more like a badly formed URL than anything else to me.

JK


You know your website is cool, so why not let your users help you by spreading the word on social networking sites - get the DotNetNuke Social Bookmarks Module with 57 different ways to add social bookmarks to your site ... or download the FREE demo right now
 
Previous
 
Next
HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...url query string attacksurl query string attacks


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out