T Horton Posted May 11, 2008 Share Posted May 11, 2008 Hello All I was just wondering whether there are some willing volunteers who would be able to test my beta version of some email analysis software I have written in PHP for me? The host address is: www.detect.thehortonfamily.co.uk Any comments, suggestions, bugs, criticisms etc would be most appreciated. Also a better name for it would be great too Thanks all and look forward to receiving your comments very soon. Best Regards Tom Horton Link to comment https://forums.phpfreaks.com/topic/105169-test-my-email-analysis-site/ Share on other sites More sharing options...
Lumio Posted May 13, 2008 Share Posted May 13, 2008 500 Internal Server Error My header: Return-Path: <[email protected]> Delivered-To: [email protected] Received: by citrosaft.com (Postfix, from userid 5000) id 6BDFE63004F; Tue, 13 May 2008 11:35:18 +0200 (CEST) Received: from localhost by zitronenkuh.athome with SpamAssassin (version 3.1.7-deb); Tue, 13 May 2008 11:35:18 +0200 From: Soft bestellen hier <[email protected]> To: [email protected] Subject: Entdecken Sie die Quelle fuer den Billigkauf Date: Tue, 13 May 2008 14:57:47 +0530 Message-Id: <[email protected]> X-Spam-Flag: YES X-Spam-Checker-Version: SpamAssassin 3.1.7-deb (2006-10-05) on zitronenkuh.athome X-Spam-Level: XXXXXXXX X-Spam-Status: Yes, score=8.3 required=3.0 tests=BAYES_99,HTML_40_50, HTML_MESSAGE,HTML_TITLE_EMPTY,URIBL_JP_SURBL autolearn=no version=3.1.7-deb MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----------=_482960D6.210E88AD" Link to comment https://forums.phpfreaks.com/topic/105169-test-my-email-analysis-site/#findComment-539775 Share on other sites More sharing options...
T Horton Posted May 15, 2008 Author Share Posted May 15, 2008 Hi "Lumio" Thanks for that. I know what the problem is. On the last line of your header, you will see there is a ";" half way across. For some reason the server doesn't like that, thus the 500 internal error. If you press the enter key straight after that, and put the remaining text on a new line, you should find it will work (it did for me when I tried it). I am currently investigating a workaround for this so that end users don't need to be aware of it. Looking at your header, it would appear there is no IP address to help the Detect software track down where it has come from exactly, but what I aim to do is incorporate a domain name lookup as well as the IP lookup, so that if there is no IP address, there is at least one point of contact to start with. Thanks again for testing it. I will keep you posted on the progress. Best Regards Tom Link to comment https://forums.phpfreaks.com/topic/105169-test-my-email-analysis-site/#findComment-542444 Share on other sites More sharing options...
T Horton Posted May 17, 2008 Author Share Posted May 17, 2008 Hi "Lumio" Just to let you know I have now finally fixed that bug you told me about. If you try that header you sent me, you should find that works now. You should also find the layout and features slightly different to the first time you tested too. Hopefully for the better. If you come across any other bugs, or if you have any other ideas for the software then please do let me know. Many thanks for your help on this. Best Regards Tom Link to comment https://forums.phpfreaks.com/topic/105169-test-my-email-analysis-site/#findComment-543816 Share on other sites More sharing options...
darkfreaks Posted July 6, 2008 Share Posted July 6, 2008 XSS Vunerability: The GET variable ip has been set to <script>alert(396460229916)</script>. XSS Vunerability: The GET variable ip has been set to </textarea><ScRiPt%20%0a%0d>alert(396500229918)%3B</ScRiPt>. XSS Vunerability: The GET variable ip has been set to email@some<ScRiPt%20%0a%0d>alert(396530229918)%3B</ScRiPt>domain.com. XSS Vunerability: The GET variable ip has been set to </title><ScRiPt%20%0a%0d>alert(396510229918)%3B</ScRiPt>. XSS Vunerability: <ScRiPt+src=http://testphp.acunetix.com/xss.js?396650230073></ScRiPt>. XSS Vunerability: The GET variable ip has been set to <body+onload=alert(396640230073)>. XSS Vunerability: The GET variable ip has been set to <script/xss+src=http://testphp.acunetix.com/xss.js?396660230203></script> XSS Vunerability: <img+src=http://testphp.acunetix.com/dot.gif+onload=alert(396670230203)>. XSS Vunerability: The GET variable ip has been set to %3C/xss/*-*/style=xss:e/**/xpression(alert(396830230327))%3E. XSS Vunerability: The GET variable ip has been set to <iframe/+/onload=alert(396860230436)></iframe>. Link to comment https://forums.phpfreaks.com/topic/105169-test-my-email-analysis-site/#findComment-582712 Share on other sites More sharing options...
darkfreaks Posted July 9, 2008 Share Posted July 9, 2008 Vulnerability description This page was found as link but is inaccessible. This vulnerability affects /webfxlayout.js. The impact of this vulnerability Problems navigating the site. Attack details No details are available. View HTTP headers Request GET /webfxlayout.js HTTP/1.0 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: www.detect.thehortonfamily.co.uk Cookie: PHPSESSID=dfu8cb51ebv054c8mo8cukp3b0 Connection: Close Pragma: no-cache Referer: http://www.detect.thehortonfamily.co.uk Acunetix-Product: WVS/5.0 (Acunetix Web Vulnerability Scanner - EVALUATION) Acunetix-Scanning-agreement: Third Party Scanning PROHIBITED Acunetix-User-agreement: http://www.acunetix.com/wvs/disc.htmResponse HTTP/1.1 404 Not Found Date: Wed, 09 Jul 2008 03:42:08 GMT Server: NOYB Connection: close Content-Type: text/html; charset=iso-8859-1 View HTML response Launch the attack with HTTP Editor How to fix this vulnerability Remove the links to this file or make this available. Broken links Vulnerability description This page was found as link but is inaccessible. This vulnerability affects /webfxapi.js. The impact of this vulnerability Problems navigating the site. Attack details No details are available. View HTTP headers Request GET /webfxapi.js HTTP/1.0 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: www.detect.thehortonfamily.co.uk Cookie: PHPSESSID=dfu8cb51ebv054c8mo8cukp3b0 Connection: Close Pragma: no-cache Referer: http://www.detect.thehortonfamily.co.uk Acunetix-Product: WVS/5.0 (Acunetix Web Vulnerability Scanner - EVALUATION) Acunetix-Scanning-agreement: Third Party Scanning PROHIBITED Acunetix-User-agreement: http://www.acunetix.com/wvs/disc.htmResponse HTTP/1.1 404 Not Found Date: Wed, 09 Jul 2008 03:42:08 GMT Server: NOYB Connection: close Content-Type: text/html; charset=iso-8859-1 View HTML response Launch the attack with HTTP Editor How to fix this vulnerability Remove the links to this file or make this available. Broken links Vulnerability description This page was found as link but is inaccessible. This vulnerability affects /inc/monofont.ttf. The impact of this vulnerability Problems navigating the site. Attack details No details are available. How to fix this vulnerability Remove the links to this file or make this available. Broken links Vulnerability description This page was found as link but is inaccessible. This vulnerability affects /local/dhtml/xmenu/xmenu.css. The impact of this vulnerability Problems navigating the site. Attack details No details are available. View HTTP headers Request GET /local/dhtml/xmenu/xmenu.css HTTP/1.0 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: www.detect.thehortonfamily.co.uk Cookie: PHPSESSID=dfu8cb51ebv054c8mo8cukp3b0 Connection: Close Pragma: no-cache Referer: http://www.detect.thehortonfamily.co.uk/local/webfxlayout.css Acunetix-Product: WVS/5.0 (Acunetix Web Vulnerability Scanner - EVALUATION) Acunetix-Scanning-agreement: Third Party Scanning PROHIBITED Acunetix-User-agreement: http://www.acunetix.com/wvs/disc.htmResponse HTTP/1.1 404 Not Found Date: Wed, 09 Jul 2008 03:42:37 GMT Server: NOYB Connection: close Content-Type: text/html; charset=iso-8859-1 View HTML response Launch the attack with HTTP Editor How to fix this vulnerability Remove the links to this file or make this available. Broken links Vulnerability description This page was found as link but is inaccessible. This vulnerability affects /inc/index.php. The impact of this vulnerability Problems navigating the site. Attack details No details are available. View HTTP headers Request GET /inc/index.php HTTP/1.0 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: www.detect.thehortonfamily.co.uk Cookie: PHPSESSID=dfu8cb51ebv054c8mo8cukp3b0 Connection: Close Pragma: no-cache Referer: http://www.detect.thehortonfamily.co.uk/inc/header.php Acunetix-Product: WVS/5.0 (Acunetix Web Vulnerability Scanner - EVALUATION) Acunetix-Scanning-agreement: Third Party Scanning PROHIBITED Acunetix-User-agreement: http://www.acunetix.com/wvs/disc.htmResponse HTTP/1.1 404 Not Found Date: Wed, 09 Jul 2008 03:42:39 GMT Server: NOYB Connection: close Content-Type: text/html; charset=iso-8859-1 View HTML response Launch the attack with HTTP Editor How to fix this vulnerability Remove the links to this file or make this available. Broken links Vulnerability description This page was found as link but is inaccessible. This vulnerability affects /inc/scanemail.php. The impact of this vulnerability Problems navigating the site. Attack details No details are available. View HTTP headers Request GET /inc/scanemail.php HTTP/1.0 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: www.detect.thehortonfamily.co.uk Cookie: PHPSESSID=dfu8cb51ebv054c8mo8cukp3b0 Connection: Close Pragma: no-cache Referer: http://www.detect.thehortonfamily.co.uk/inc/header.php Acunetix-Product: WVS/5.0 (Acunetix Web Vulnerability Scanner - EVALUATION) Acunetix-Scanning-agreement: Third Party Scanning PROHIBITED Acunetix-User-agreement: http://www.acunetix.com/wvs/disc.htmResponse HTTP/1.1 404 Not Found Date: Wed, 09 Jul 2008 03:42:39 GMT Server: NOYB Connection: close Content-Type: text/html; charset=iso-8859-1 View HTML response Launch the attack with HTTP Editor How to fix this vulnerability Remove the links to this file or make this available. Broken links Vulnerability description This page was found as link but is inaccessible. This vulnerability affects /inc/contactus.php. The impact of this vulnerability Problems navigating the site. Attack details No details are available. View HTTP headers Request GET /inc/contactus.php HTTP/1.0 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: www.detect.thehortonfamily.co.uk Cookie: PHPSESSID=dfu8cb51ebv054c8mo8cukp3b0 Connection: Close Pragma: no-cache Referer: http://www.detect.thehortonfamily.co.uk/inc/header.php Acunetix-Product: WVS/5.0 (Acunetix Web Vulnerability Scanner - EVALUATION) Acunetix-Scanning-agreement: Third Party Scanning PROHIBITED Acunetix-User-agreement: http://www.acunetix.com/wvs/disc.htmResponse HTTP/1.1 404 Not Found Date: Wed, 09 Jul 2008 03:42:39 GMT Server: NOYB Connection: close Content-Type: text/html; charset=iso-8859-1 View HTML response Launch the attack with HTTP Editor How to fix this vulnerability Remove the links to this file or make this available Vulnerability description Password type input named password from unnamed form with action login.php has autocomplete enabled. An attacker with local access could obtain the cleartext password from the browser cache. This vulnerability affects /. The impact of this vulnerability Possible sensitive information disclosure Attack details No details are available. View HTTP headers Request GET / HTTP/1.0 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: www.detect.thehortonfamily.co.uk Connection: Close Pragma: no-cache Acunetix-Product: WVS/5.0 (Acunetix Web Vulnerability Scanner - EVALUATION) Acunetix-Scanning-agreement: Third Party Scanning PROHIBITED Acunetix-User-agreement: http://www.acunetix.com/wvs/disc.htmResponse HTTP/1.1 200 OK Date: Wed, 09 Jul 2008 03:41:50 GMT Server: NOYB X-Powered-By: PHP/5.2.4 Set-Cookie: PHPSESSID=dfu8cb51ebv054c8mo8cukp3b0; path=/ Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Connection: close Content-Type: text/html View HTML response Launch the attack with HTTP Editor How to fix this vulnerability The password autocomplete should be disabled in sensitive applications. To disable autocomplete, you may use a code similar to: <INPUT TYPE="password" AUTOCOMPLETE="off"> Password type input with autocomplete enabled Vulnerability description Password type input named password from unnamed form with action login.php has autocomplete enabled. An attacker with local access could obtain the cleartext password from the browser cache. This vulnerability affects /index.php. The impact of this vulnerability Possible sensitive information disclosure Attack details No details are available. View HTTP headers Request GET /index.php HTTP/1.0 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: www.detect.thehortonfamily.co.uk Cookie: PHPSESSID=dfu8cb51ebv054c8mo8cukp3b0 Connection: Close Pragma: no-cache Referer: http://www.detect.thehortonfamily.co.uk Acunetix-Product: WVS/5.0 (Acunetix Web Vulnerability Scanner - EVALUATION) Acunetix-Scanning-agreement: Third Party Scanning PROHIBITED Acunetix-User-agreement: http://www.acunetix.com/wvs/disc.htmResponse HTTP/1.1 200 OK Date: Wed, 09 Jul 2008 03:42:08 GMT Server: NOYB X-Powered-By: PHP/5.2.4 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Connection: close Content-Type: text/html View HTML response Launch the attack with HTTP Editor How to fix this vulnerability The password autocomplete should be disabled in sensitive applications. To disable autocomplete, you may use a code similar to: <INPUT TYPE="password" AUTOCOMPLETE="off"> Link to comment https://forums.phpfreaks.com/topic/105169-test-my-email-analysis-site/#findComment-585033 Share on other sites More sharing options...
Recommended Posts