2009/3/11 Jochem Maas
> Stuart schreef:
> > Escape stuff coming in and escape stuff going out. There are no
> exceptions.
>
>
> actually that should be: filter stuff coming in, escape stuff going out.
>
Good schreef! Erm, I mean, quite right to.
Top o' the morning. Etc.
-Stuart
--
http://stu
Stuart schreef:
> Please include the list when replying unless you're looking to hire me!
>
> 2009/3/11 filtered
>
>> On Wed, Mar 11, 2009 at 13:41, Stuart wrote:
>>> 2009/3/11 filtered
>>> $_GET['cam'] looks fine. $_GET['studio'] is not.
>>> I could build a URL that would output a javascript
On Wed, Mar 11, 2009 at 7:56 AM, Michael A. Peters wrote:
> filtered wrote:
>>
>> On Wed, Mar 11, 2009 at 13:44, Jochem Maas wrote:
>>>
>>> filtered schreef:
Hi,
we have script containing
>>>
>>> let say I do:
>>>
>>> example.com/yourscript.php?studio=alert('I
>>>
filtered wrote:
On Wed, Mar 11, 2009 at 13:44, Jochem Maas wrote:
filtered schreef:
Hi,
we have script containing
let say I do:
example.com/yourscript.php?studio=alert('I am an evil
haxor');
excusing the fact that the query is not urlencoded, what happens on your site
(replace domain a
> filtered schreef:
>> Hi,
>>
>> we have script containing
>>
>>
>
> let say I do:
>
> example.com/yourscript.php?studio=alert('I am
> an evil haxor');
>
> excusing the fact that the query is not urlencoded, what happens on your site
> (replace domain and script name to match your site/script)
>
Please include the list when replying unless you're looking to hire me!
2009/3/11 filtered
> On Wed, Mar 11, 2009 at 13:41, Stuart wrote:
> > 2009/3/11 filtered
>
> >
> > $_GET['cam'] looks fine. $_GET['studio'] is not.
> > I could build a URL that would output a javascript tag to do anything
filtered wrote:
Hi,
we have script containing
http://www.yourwebsite.org/yourpage.php?studio=alert('xss');
and
http://example.com""; />';
}
?>
That I don't think is exploitable since you are not doing anything with
cam directly but are only acting if it is a string ma
On Wed, Mar 11, 2009 at 13:44, Jochem Maas wrote:
> filtered schreef:
>> Hi,
>>
>> we have script containing
>>
>>
>
> let say I do:
>
> example.com/yourscript.php?studio=alert('I am
> an evil haxor');
>
> excusing the fact that the query is not urlencoded, what happens on your site
> (replace
filtered wrote:
Hi,
we have script containing
and
http://example.com""; />';
}
?>
Is this code prone to XSS attacks or for attacking the local webserver
and if so, how?
$cam isn't used anywhere else.
-a
It certainly is XSS vulnerable through a reflective XSS attack.
cl
filtered schreef:
> Hi,
>
> we have script containing
>
>
let say I do:
example.com/yourscript.php?studio=alert('I am an
evil haxor');
excusing the fact that the query is not urlencoded, what happens on your site
(replace domain and script name to match your site/script)
>
> and
>
>
2009/3/11 filtered
> Hi,
>
> we have script containing
>
>
>
> and
>
>$cam = $_GET['cam'];
>
>if ($cam == '1') {
>echo 'http://example.com""; />';
>}
> ?>
>
> Is this code prone to XSS attacks or for attacking the local webserver
> and if so, how?
>
>
Hi,
we have script containing
and
http://example.com""; />';
}
?>
Is this code prone to XSS attacks or for attacking the local webserver
and if so, how?
$cam isn't used anywhere else.
-a
--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.p
12 matches
Mail list logo