Jump to content

Could somebody give me feedback?


waynewex

Recommended Posts

Fix:

 

set session.use_only_cookies=0 to  session.use_only_cookies=1 in php.ini

 

 

Sensitive Directory Found

 

/img

 

Fix

 

Restrict Access to this directory

 

GHDB found (google hacking)

/tmp

Fix:

 

Remove file/directory or restrict access.

Link to comment
Share on other sites

HAHAAHHAAH, That front page letter was AWESOME! 90% of internet users just sitting there, eyes glued to the monitor, not even know what they're looking for (or something related).

 

You made me laugh for like ten minutes nonstop. HILARIOUS.

The articles there are funny too.

Link to comment
Share on other sites

  • 3 weeks later...

GHDB: Possible PHP configuration file (config.php)

The description for this alert is contributed by the GHDB community, it may contain inappropriate language.

 

Category : Files containing passwords

 

This search brings up sites with "config.php" files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. Way to go, googleDorks!!

This vulnerability affects /wp-includes/js/tinymce.

The impact of this vulnerability

Not available. Check description.

Attack details

We found

intitle:index.of config.php

 

How to fix this vulnerability

Not available. Check description

 

 

 

GHDB: Possible upload script

The description for this alert is contributed by the GHDB community, it may contain inappropriate language.

 

Category : Footholds

 

Searches for scripts that let you upload files which you can then execute on the server.

This vulnerability affects /wp-includes/js/swfupload/plugins.

The impact of this vulnerability

Not available. Check description.

 

Attack details

We found

"index of /" ( upload.cfm | upload.asp | upload.php | upload.cgi | upload.jsp | upload.pl )

 

How to fix this vulnerability

Not available. Check description

 

Link to comment
Share on other sites

to fix the config.php Exploit after reading up on it please restrict acess so it cant be read unless its required to read.

 

 

on your server set the file config.php permissions to 0 0 0

 

then in php everytme you include the config file do

 

 

<?php

chmod("config.php",0644); //makes file readable and writable

include("config.php");
?>

Link to comment
Share on other sites

Input Type Password Autocomplete Enabled

Password type input named pass from unnamed form with action ./process.php has autocomplete enabled. An attacker with local access could obtain the cleartext password from the browser cache.

The impact of this vulnerability

Possible sensitive information disclosure

How to fix this vulnerability

The password autocomplete should be disabled in sensitive applications. To disable autocomplete, you may use a code similar to: < INPUT TYPE="password" AUTOCOMPLETE="off" >

 

 

also make sure both the POST and GET variables are filtered wsith mysql_real_escape_string(),trim() and strip_tags()

 

i say this because i am detecting SQL and XSS injection ;)

 

 

Link to comment
Share on other sites

Input Type Password Autocomplete Enabled

Password type input named pass from unnamed form with action ./process.php has autocomplete enabled. An attacker with local access could obtain the cleartext password from the browser cache.

The impact of this vulnerability

Possible sensitive information disclosure

How to fix this vulnerability

The password autocomplete should be disabled in sensitive applications. To disable autocomplete, you may use a code similar to: < INPUT TYPE="password" AUTOCOMPLETE="off" >

 

 

also make sure both the POST and GET variables are filtered wsith mysql_real_escape_string(),trim() and strip_tags()

 

i say this because i am detecting SQL and XSS injection ;)

 

Hey dark, u seem to be the security king around here, is it wise to use all 3 escape_string, trim and strip tags or would one be sufficient to prevent XSS attacks?

Link to comment
Share on other sites

Input Type Password Autocomplete Enabled

Password type input named pass from unnamed form with action ./process.php has autocomplete enabled. An attacker with local access could obtain the cleartext password from the browser cache.

The impact of this vulnerability

Possible sensitive information disclosure

How to fix this vulnerability

The password autocomplete should be disabled in sensitive applications. To disable autocomplete, you may use a code similar to: < INPUT TYPE="password" AUTOCOMPLETE="off" >

 

 

also make sure both the POST and GET variables are filtered wsith mysql_real_escape_string(),trim() and strip_tags()

 

i say this because i am detecting SQL and XSS injection ;)

 

Hey dark, u seem to be the security king around here, is it wise to use all 3 escape_string, trim and strip tags or would one be sufficient to prevent XSS attacks?

 

 

Def. a good idea, and I would suggest you take it a tiny step further and instead of doing the same 3 functions each time, just make a function called something like escape_text() that takes in the $_GET or $_POST variable and returns the escaped text. It'd just make it a little easier

Link to comment
Share on other sites

Input Type Password Autocomplete Enabled

Password type input named pass from unnamed form with action ./process.php has autocomplete enabled. An attacker with local access could obtain the cleartext password from the browser cache.

The impact of this vulnerability

Possible sensitive information disclosure

How to fix this vulnerability

The password autocomplete should be disabled in sensitive applications. To disable autocomplete, you may use a code similar to: < INPUT TYPE="password" AUTOCOMPLETE="off" >

 

 

also make sure both the POST and GET variables are filtered wsith mysql_real_escape_string(),trim() and strip_tags()

 

i say this because i am detecting SQL and XSS injection ;)

 

Hey dark, u seem to be the security king around here, is it wise to use all 3 escape_string, trim and strip tags or would one be sufficient to prevent XSS attacks?

 

 

Def. a good idea, and I would suggest you take it a tiny step further and instead of doing the same 3 functions each time, just make a function called something like escape_text() that takes in the $_GET or $_POST variable and returns the escaped text. It'd just make it a little easier

 

Yeah i currently have a function that checks if a string is set and not empty, then returns the string with trim, mysql escape and strip tags.

 

Thanks for the tips appreciate it :)

Link to comment
Share on other sites

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.