Jump to content

LeadingWebDev

Members
  • Posts

    79
  • Joined

  • Last visited

    Never

Posts posted by LeadingWebDev

  1. class picOutline
    {
    function picOutline($opts=array()) {
    	$this->imageUrl=$opts['imageUrl'];
    	$this->borderColor=$opts['$borderColor'];
    	$this->link=$opts['$link'];
    	$this->altText=$opts['$altText'];
    	$this->width=$opts['$width'];
    	$this->height=$opts['$height'];
    	$this->align=$opts['$align'];
    
    }
    Function Set($varname,$value) {
    	$this->$varname=$value;
    }
    Function displayImage() {
    	if ($this->link) { echo "<a href='".$this->link."'>"; }
    
    	echo "<img src='".$this->imageUrl."' ";
    	if ($this->borderColor) { echo "style='border: 1px solid ".$this->borderColor.";' "; }
    	if ($this->width) { echo "width='".$this->width."' "; }
    	if ($this->height) { echo "height='".$this->height."' "; }
    	if ($this->altText) { echo "alt='".$this->altText."' "; }
    	echo "align='".$this->align."' />";
    	if ($this->link) { echo "</a>"; }
    }
    
    }
    

    HTH

  2. This does not following redirect, htaccess should redirect u to index.php in this directory.

    However htaccess maybe returns u the http 302 or 301, you should setopt follow location.

     

    try putting

    curl_setopt($clean_url_check, CURLOPT_FOLLOWLOCATION, TRUE);

     

    to debug the response u receive from server, send him POST request and echo result, rather than sending GET.

     

    HTH

  3. First of all, i already see a vulnerability there.

    Filter visitors email with filter_var, as you create a header with and it is vulnerable to external attacks.

    for vulnerability explanation read : http://www.php-security.org/MOPB/MOPB-34-2007.html

     

      
              $headers .= "\nSubject: Resume from the 'Careers' page";
    
              $message = "This is a multi-part message in MIME format.\n\n" .
              "--{$mime_boundary}\n" .
              "Content-Type: text/plain; charset=\"iso-8859-1\"\n" .
              "Content-Transfer-Encoding: 8bit\n\n" .
               $skills . "\n\n" .
               $name . "\n\n" .
               $phone . "\n\n" .
               $email . "\n\n";
    

  4. be careful.

    its probably <IFRAME> 1x1 pixel.

    location: between <body> and </body> at most at the bottom.

     

    I will say its not just change FTP log info, the server may hacked from even another site hosted at the same server, and then with shell they just uploaded php script that looping throught all server files, and inserts IFRAME in every page.

     

    if you will get same infection again, you will probably need to contact server administration ASAP.

  5. What really you need to give as Server?

    $row[server] means you get this variable from database table CES row Server, if u dont have this row in your table its being blank var and return notices of  not existed index.

     

    please quick, g2g sleep, my time almost 5AM

  6. ok so i got md5($var); to work but what is the other guy talking about

     

    LeadingWebDev is rambling. He was describing a possible sql injection. The data is however being escaped properly and is not subject to this vulnerability.

     

    Right  8)

  7. Are you storing your passwords as md5 hashes?

    no im not i dont know how to do that so i just took that part out

     

    as for

    its a big mistake to get user AND pass and check only mysql_num_rows

    as we know '1'='1' will always return true, in most cases post 1=1, etc... as login and password, query will return true, 1 row and you probably will pass login.

     

    i may explained it not soo well, but sorry for bad english ^_^

     

    i dont get what you mean.

    if a user were to type in just a username they could get in?

    do that md5($var);

     

    hacker can specify information to pass login and get inside.

    expample: i know your username, i type your username and as password i specify 1=1, etc... and then password will be true)

    script will receive information and you logging in.

     

  8. its a big mistake to get user AND pass and check only mysql_num_rows

    as we know '1'='1' will always return true, in most cases post 1=1, etc... as login and password, query will return true, 1 row and you probably will pass login.

     

    i may explained it not soo well, but sorry for bad english ^_^

     

    $sql=mysql_query("SELECT * FROM users WHERE username='$username'");
    if(mysql_num_row($sql) > 0)
    {
    $row=mysql_fetch_array($sql);
    if($password === $row['password'])
    {
    // Set session
    // redirect him
    }
    else
    {
    //error
    }
    }
    else
    {
    //wrong username or password (we know that user unexist, but won't show it)
    }
    

     

    in this example i also mean you info already protected and you not using register_globals=on as it is vulnerable too=)

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.