TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Weak isolation levels allowed to steal BTC using plain SQL

15 pointsby eivanov8911 months ago

2 comments

eatonphil11 months ago
I love the reference to the ACIDRain paper in there.<p>&gt; They analyzed “12 popular self-hosted eCommenrce applications written in four languages and deployed on over 2M websites” and identified and verified “22 critical ACIDRain attacks that allow attackers to corrupt store inventory, over-spend gift cards, and steal inventory”. According to the paper, “Of the 22 vulnerabilities, five were level-based, meaning that the default weak isolation level led to the anomalies behind the vulnerabilities.<p><a href="http:&#x2F;&#x2F;www.bailis.org&#x2F;papers&#x2F;acidrain-sigmod2017.pdf" rel="nofollow">http:&#x2F;&#x2F;www.bailis.org&#x2F;papers&#x2F;acidrain-sigmod2017.pdf</a>
PreInternet0111 months ago
The submitted title deviates from that of the linked post (&quot;Do we fear the serializable isolation level more than we fear subtle bugs?&quot;) and, having read the source, I&#x27;m not even sure if it&#x27;s even close to accurate...
评论 #40866244 未加载