Mega'/**/and/**/dbms_pipe.receive_message('a',2)='a Info
To protect against this type of vulnerability, you should implement the following:
This confirmation allows them to move on to more destructive queries, such as extracting usernames, passwords, or entire table structures, one character at a time based on these time delays. Mitigation and Defense
: This is likely a placeholder or a legitimate input value followed by a single quote ( ' ). The quote is used to "break out" of the intended SQL query string.
: This completes the logical condition. If the database pauses and then returns the page normally, the attacker confirms the application is vulnerable to SQL injection. How the Attack Works
In a "blind" injection, the database doesn't return error messages or data directly to the screen. Instead, the attacker observes the : The attacker sends the request.
The string MEGA'/**/and/**/DBMS_PIPE.RECEIVE_MESSAGE('a',2)='a is a classic example of a payload specifically targeting Oracle databases. Analysis of the Payload
If the page takes ~2 seconds longer than usual to load, they know the DBMS_PIPE command was successfully executed.
Since no message named 'a' is likely to be sent, the database simply pauses for those 2 seconds before continuing.
Listen to the latest episodes
1267 – Epcot and Animal Kingdom | Ray Cools It Down Again
Mega'/**/and/**/dbms_pipe.receive_message('a',2)='a Info
To protect against this type of vulnerability, you should implement the following:
This confirmation allows them to move on to more destructive queries, such as extracting usernames, passwords, or entire table structures, one character at a time based on these time delays. Mitigation and Defense
: This is likely a placeholder or a legitimate input value followed by a single quote ( ' ). The quote is used to "break out" of the intended SQL query string. MEGA'/**/and/**/DBMS_PIPE.RECEIVE_MESSAGE('a',2)='a
: This completes the logical condition. If the database pauses and then returns the page normally, the attacker confirms the application is vulnerable to SQL injection. How the Attack Works
In a "blind" injection, the database doesn't return error messages or data directly to the screen. Instead, the attacker observes the : The attacker sends the request. To protect against this type of vulnerability, you
The string MEGA'/**/and/**/DBMS_PIPE.RECEIVE_MESSAGE('a',2)='a is a classic example of a payload specifically targeting Oracle databases. Analysis of the Payload
If the page takes ~2 seconds longer than usual to load, they know the DBMS_PIPE command was successfully executed. : This completes the logical condition
Since no message named 'a' is likely to be sent, the database simply pauses for those 2 seconds before continuing.
Support our sponsors
Support the show
Sleep With Me Plus the ultimate way to listen
Hi, you can call me Scooter.
Drew Ackerman is the creator and host of Sleep With Me, the one-of-a-kind bedtime story podcast featured in The New York Times, The New Yorker, Buzzfeed, Mental Floss, and NOVA. Created in 2013, Sleep With Me combines the pain of insomnia with the relief of laughing and turns it into a unique storytelling podcast. Through Sleep With Me, Drew has dedicated himself to help those who feel alone in the deep dark night and just need someone to tell them a bedtime story.

