I take form input all over my site, and use query parameters to sanitize data. When an invalid data type is passed, a simple (not detailed) notice is thrown and I receive an email with what was passed.
It appears that in this automated attack, one of the dropdown boxes is reinjected into one of the fields and iterated through. What's the objective of this, and how can I make sure it doesn't work?
Here's some sample errors (edited down):
Invalid data Choose Calendars for CFSQLTYPE CF_SQL_INTEGER. Invalid data -------------------------------- for CFSQLTYPE CF_SQL_INTEGER. {20 more with every single option} Edit: going to try to explain a little better, bear with me! Here's the HTML:
<select> <option value="0">Choose Calendars </option> <option value="0">--------------------------------</option> <option value="0">Select multiple calendars...</option> <option value="0">--------------------------------</option> <option value="0">Select a calendar from this list...</option> <option value="1">Options 1-30</option> (Rinse and repeat) </select> When a value is selected, it is added to the URL (GET) and submitted - the attack seems to be taking all of the options as an array and putting them into the GET request to try to compromise the SQL. I hope that makes sense?