iis - Uploaded access database - running SSIS and virus vulnerability -


i have created process (registered) user can upload (after client-side , server-side validation) (zipped uncommon extension) access database server through asp.net webform, sit in nice secure location until scheduled ssis package comes along @ night, flow relevant data access db sql server.

after that, access db deleted. there no other execution of db. access not installed on server.

i've done research, of course, introducing vulnerability (script inside access db instance?) ssis might trigger?

thank in advance.

ssis uses odbc or oledb data in access/jet/ace database, there nothing there execute code -- odbc , oledb know nothing data , dangerous functions executed in sql statements blocked.

so, without access installed, no, there's no real danger here. if you're concerned there is, process file dao before open , delete in querydefs collection , in modules document collection. or, use buffer database import nothing data tables, , pass ssis.

but don't think ssis looking @ data tables begin with.

btw, there has never once been virus or exploit has been propagated via access, concerns on access vulnerabilities vastly overblown (with massive inconveniance end users result, blocked macros, sandbox mode , a2007 on, need define trusted locations).


Comments

Popular posts from this blog

c# - How to set Z index when using WPF DrawingContext? -

razor - Is this a bug in WebMatrix PageData? -

visual c++ - Using relative values in array sorting ( asm ) -