By using this site, you agree to our Privacy Policy and our Terms of Use. Close

Forums - Sony Discussion - Potential security issue on PSN (again)

   
Popular with players and apparently also among hackers: the Playstation Network (image: screenshot Golem.de)

  Injection: vulnerability allows access to Sony's customer data

An SQL injection vulnerability allows access to customer data of the Playstation Network. Sony was informed two weeks ago about the vulnerability, but it was not yet closed. It is not the first incident in the Playstation Network.

A security researcher has found on the website of Sony a critical SQL injection vulnerability. The vulnerability allows the customer data from participants in the Playstation Networks read.

Was discovered in the gap of Aria Akhavan. The IT security expert had informed Sony claims to two weeks ago about the existence of the gap. Reacts Sony has not so far. The gap uses a function on the website of the support of Sony, there may be manipulated by means of a parameter in a URL request to a SQL Server database from Sony will be sent. The output contains a potential attacker directly in the browser.

Further details on the use of the gap are Golem.de before. Due to the severity of the gap and thus the possible access to numerous customer data we decided not to publish the details. We have Sony asked for an opinion, but we have not yet received a response.

Sony's Playstation Network was last 2,011 victims of a major hacker attack. At that time, the access and personal data were stolen from 77 million users . As a result, in many countries, authorities and politicians had dealt with the incident and demanded by Sony better protection of customer data. Also in August of this year there was a attack on the Playstation Network , but it was only a distributed denial-of-service attack (DDoS).

SQL injection attacks are one of the most common and dangerous vulnerabilities in web applications. Only recently was a serious SQL injection vulnerability in the content management system Drupal has become known, numerous websites have been hacked so that in the last days.

SQL injection vulnerabilities occur whenever a web application inserts inputs from users unchecked and unfiltered in SQL commands. Through the consistent use of so-called prepared statements are SQL injection vulnerabilities can be completely prevented. Especially in safety-critical applications, the use of prepared statements is therefore strongly recommended.

 

Source: https://translate.google.com/translate?hl=en&sl=auto&tl=en&u=http%3A%2F%2Fwww.golem.de%2Fnews%2Fsql-injection-sicherheitsluecke-erlaubt-zugriff-auf-sony-kundendaten-1410-110199.html

 



Around the Network

the only data accessible through unauthed access is the same data trophy websites and third party psn apps can access, basically the stuff you set to public.

nothing to see here, move along.



Tachikoma said:
the only data accessible through unauthed access is the same data trophy websites and third party psn apps can access, basically the stuff you set to public.

nothing to see here, move along.

Tachikoma, always playing the "I know more about this than all of you", right?

 

Let me guess, you are the one who found it? Right?

 

Probably this adds more to the topic than your "reaction":

 

https://translate.google.de/translate?sl=de&tl=en&js=y&prev=_t&hl=de&ie=UTF-8&u=https%3A%2F%2Ftarnkappe.info%2Fpsn-network-mit-kritischer-sicherheitsluecke%2F&edit-text=



Seriously ? A topic based on Google translation of a news from 4 days ago on an unknown website ? If there was really an issue, why no one else talks about it ?



Predictions for end of 2014 HW sales:

 PS4: 17m   XB1: 10m    WiiU: 10m   Vita: 10m

 

walsufnir said:

Tachikoma, always playing the "I know more about this than all of you", right?

 

Let me guess, you are the one who found it? Right?

 

Probably this adds more to the topic than your "reaction":

 

https://translate.google.de/translate?sl=de&tl=en&js=y&prev=_t&hl=de&ie=UTF-8&u=https%3A%2F%2Ftarnkappe.info%2Fpsn-network-mit-kritischer-sicherheitsluecke%2F&edit-text=

I know that the sensitve data is no longer stored on the same server as the profile/email databases, and that having full access to the login server will net you nothing but a massive list of numerical account id's and salted emails.

But hey, continue with your one man hate crusade that pretty much the whole forum know you're on.

And no, I didn't find this one, I found the one in 2011.



Around the Network
Aerys said:

Seriously ? A topic based on Google translation of a news from 4 days ago on an unknown website ? If there was really an issue, why no one else talks about it ?


golem.de is a very well known site in germany. they may not be the professionals they think they are, but they are in no way unprofessional.

 

OT: omg. sql injection is so easy to prevent. can't understand why such things are still happening to big companies.



must-have-list for platforms i don't own yet:

WiiU: Donkey Kong

XBone: Dead Rising 3, Ryse

Aerys said:

Seriously ? A topic based on Google translation of a news from 4 days ago on an unknown website ? If there was really an issue, why no one else talks about it ?


It's common that you give the company the chance to react and solve the problem before you actively spread the word on the internet.



How is a topic like this still open with such questionable content? And what's with the "Again" in the title? You can at least try to be neutral when posting "news"



bubblegamer said:
How is a topic like this still open with such questionable content? And what's with the "Again" in the title? You can at least try to be neutral when posting "news"


What in this news is questionable for you? Please elaborate. And why not "again"? Do you want to pretend this is the first time?



Tachikoma said:

And no, I didn't find this one, I found the one in 2011.

hoooboy, I sorta want op to call bs on this since I know damn well what will happen.

 

Grab the popcorn folks.