Στις 8/11/2013 12:46 πμ, ο/η Tim Delaney έγραψε:
On 8 November 2013 09:45, Tim Delaney <timothy.c.dela...@gmail.com
<mailto:timothy.c.dela...@gmail.com>> wrote:

    On 8 November 2013 09:18, Νίκος Αλεξόπουλος <nikos.gr...@gmail.com
    <mailto:nikos.gr...@gmail.com>> wrote:

        I feel a bit proud because as it seems i have manages to secure
        it more tight. All i need to do was to validate user input data,
        so the hacker won't be able again to pass bogus values to
        specific variables that my script was using.


    So we now have confirmation that Nikos' site is subject to SQL
    injection attacks on anything that he is not specifically
    validating. And I'm absolutely sure that he has identified every
    location where input needs to be validated, and that it is
    impossible to get past the level of validation that he's doing, so
    the site is completely secure! Just like the last time he claimed
    that (and the time before, and the time before that ...).


Not to mention the idiocy of exposing your web server logs to the
outside world ... (no - I didn't go there - I want no chance of getting
malware from his site).

Tim Delaney


It was necessary post post web server's logs by doing
tail -f '/usr/local/apache/logs/error_log'

so to display the error message i got.

Also i never claimed i was a professional coder, i am an amateur at a beginner level and i do it out of hobby.

I could have designed my website in a CMS( wordpress, joomla) but i like programming and wanted to design and learn to code at the same time.

Since i'm an idiot as you call me try to hack it yourself since you are so smart.

And i don;t think it was an sql injection by the way.
It was just a manipulation of the 'page' variable my script is using.
Hacker was able to pass bogus info to that variable.

I believe he passed values to var 'page' via URL like

http://superhost.gr/?page='

--
https://mail.python.org/mailman/listinfo/python-list

Reply via email to