How to say you’re vulnerable to code injection without saying you’re vulnerable to code injection.
Maybe they filtered those strings to be safe, and put the notice there to answer the invertible “why won’t it accept my password” queries.
It’s a shitty password engine. But not necessarily uncleansed
If they’re trying to protect themselves from code injection by rejecting certain user input like that, then they don’t actually know how to protect themselves from code injection correctly and there may be serious vulnerabilities that they’ve missed.
(I think it’s likely that, as others have said, they’re using off-the-shelf software that does properly sanitize user input, and that this is just the unnecessary result of management making ridiculous demands. Even then, it’s evidence of an organization that doesn’t have the right approach to security.)
Didn’t say anything about truncate!
Looking at that I wouldn’t be surprised if those rules are just client-side validation.
Obligatory Little Bobby Tables: https://xkcd.com/327/
And for those who feel like saying they’ve already seen it: https://xkcd.com/1053/
Little Bobby drop tables
So they’re not hashing or salting the passwords too. Cool…
submits Drop Table as passphrase
Grabs popcorn
I don’t believe this is real. This isn’t real, right?
This is real - I took the screenshot myself.
Oh BobbyTables, you little rapscallion…
We could still have some fun with ALTER TABLE