Re: [PHP] This code using _GET exploitable

2009-03-11 Thread Stuart
2009/3/11 Jochem Maas > Stuart schreef: > > Escape stuff coming in and escape stuff going out. There are no > exceptions. > > > actually that should be: filter stuff coming in, escape stuff going out. > Good schreef! Erm, I mean, quite right to. Top o' the morning. Etc. -Stuart -- http://stu

Re: [PHP] This code using _GET exploitable

2009-03-11 Thread Jochem Maas
Stuart schreef: > Please include the list when replying unless you're looking to hire me! > > 2009/3/11 filtered > >> On Wed, Mar 11, 2009 at 13:41, Stuart wrote: >>> 2009/3/11 filtered >>> $_GET['cam'] looks fine. $_GET['studio'] is not. >>> I could build a URL that would output a javascript

Re: [PHP] This code using _GET exploitable

2009-03-11 Thread haliphax
On Wed, Mar 11, 2009 at 7:56 AM, Michael A. Peters wrote: > filtered wrote: >> >> On Wed, Mar 11, 2009 at 13:44, Jochem Maas wrote: >>> >>> filtered schreef: Hi, we have script containing   >>> >>> let say I do: >>> >>> example.com/yourscript.php?studio=alert('I >>>

Re: [PHP] This code using _GET exploitable

2009-03-11 Thread Michael A. Peters
filtered wrote: On Wed, Mar 11, 2009 at 13:44, Jochem Maas wrote: filtered schreef: Hi, we have script containing let say I do: example.com/yourscript.php?studio=alert('I am an evil haxor'); excusing the fact that the query is not urlencoded, what happens on your site (replace domain a

Re: [PHP] This code using _GET exploitable

2009-03-11 Thread Virgilio Quilario
> filtered schreef: >> Hi, >> >> we have script containing >> >>   > > let say I do: > > example.com/yourscript.php?studio=alert('I am > an evil haxor'); > > excusing the fact that the query is not urlencoded, what happens on your site > (replace domain and script name to match your site/script) >

Re: [PHP] This code using _GET exploitable

2009-03-11 Thread Stuart
Please include the list when replying unless you're looking to hire me! 2009/3/11 filtered > On Wed, Mar 11, 2009 at 13:41, Stuart wrote: > > 2009/3/11 filtered > > > > > $_GET['cam'] looks fine. $_GET['studio'] is not. > > I could build a URL that would output a javascript tag to do anything

Re: [PHP] This code using _GET exploitable

2009-03-11 Thread Michael A. Peters
filtered wrote: Hi, we have script containing http://www.yourwebsite.org/yourpage.php?studio=alert('xss'); and http://example.com""; />'; } ?> That I don't think is exploitable since you are not doing anything with cam directly but are only acting if it is a string ma

Re: [PHP] This code using _GET exploitable

2009-03-11 Thread filtered
On Wed, Mar 11, 2009 at 13:44, Jochem Maas wrote: > filtered schreef: >> Hi, >> >> we have script containing >> >>   > > let say I do: > > example.com/yourscript.php?studio=alert('I am > an evil haxor'); > > excusing the fact that the query is not urlencoded, what happens on your site > (replace

Re: [PHP] This code using _GET exploitable

2009-03-11 Thread Michael A. Peters
filtered wrote: Hi, we have script containing and http://example.com""; />'; } ?> Is this code prone to XSS attacks or for attacking the local webserver and if so, how? $cam isn't used anywhere else. -a It certainly is XSS vulnerable through a reflective XSS attack. cl

Re: [PHP] This code using _GET exploitable

2009-03-11 Thread Jochem Maas
filtered schreef: > Hi, > > we have script containing > > let say I do: example.com/yourscript.php?studio=alert('I am an evil haxor'); excusing the fact that the query is not urlencoded, what happens on your site (replace domain and script name to match your site/script) > > and > >

Re: [PHP] This code using _GET exploitable

2009-03-11 Thread Stuart
2009/3/11 filtered > Hi, > > we have script containing > > > > and > >$cam = $_GET['cam']; > >if ($cam == '1') { >echo 'http://example.com""; />'; >} > ?> > > Is this code prone to XSS attacks or for attacking the local webserver > and if so, how? > >

[PHP] This code using _GET exploitable

2009-03-11 Thread filtered
Hi, we have script containing and http://example.com""; />'; } ?> Is this code prone to XSS attacks or for attacking the local webserver and if so, how? $cam isn't used anywhere else. -a -- PHP General Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.p