Also, speaking of detection, I made a small script that can protect against
people downloading your site's forms, modifying their new local copy (and
putting an absolute URL in the form's ACTION attribute), and then posting
data using the botched form. If it's bulletproof, then I figured this could
help some of you out. If not, I welcome comments (I'm a little bit hesitant
of calling things 'bulletproof'). $http_referer (lowercase) is the
parse_url() of $_SERVER["HTTP_REFERER"]. Some local mucking up can give you
the format you want for it.

if((count($_POST) > 0) && (!stristr($_SERVER["HTTP_REFERER"],
$http_referer))) {
        unset($_POST);
        $evil = "postedfromoutsidepage";
}

Then, you can test for $evil when you need to print an error message or
decide whether or not the data is proper.

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to