• BombOmOm@lemmy.world
      link
      fedilink
      English
      arrow-up
      60
      arrow-down
      1
      ·
      2 years ago

      Assuming the accounting system this thing links with both does not protect from SQL injection attacks (many don’t, despite it being easy to protect against) and also has a table named “Bills” with a field named “amount”; what this would do is go through every single Bills record and half the value in the amount field. This would completely fuck the system, particularly when it came to billing and tax filing as the numbers for accounts billing and receivable wouldn’t even come close to matching each other. The accounting department would have a hell of a time fixing the damage.

    • Kerb@discuss.tchncs.de
      link
      fedilink
      arrow-up
      33
      arrow-down
      1
      ·
      2 years ago

      its an sql injection attack.
      its rather unlikely that it works in a modern app.

      assuming this would work,
      it injects a command in the sql database.

      it is assumed that the app runs a sql querry with the input field as a parameter e.g.
      INSERT INTO "bills" (item, ammount, tip) VALUES ("steak", "20,00 $", "content of the custom tip goes here");

      the semicolon indicates the end of the querry,
      so the the text would cause the app to run an unfinished querry, and then start a new querry that messes up the content of the bills table.

    • diffcalculus@lemmy.world
      link
      fedilink
      English
      arrow-up
      23
      arrow-down
      1
      ·
      2 years ago

      Nothing. For one, it won’t let you enter letters. Two, the table structure to these POS systems are more nuanced than a simple bills table with am amounts field.

      It’s amusing and all, but it’s not something you can do.

      Source: work with, and develop around, these types of POS systems.