Jump to content

Try to mess up my Shoutbox


blufish

Recommended Posts

Might I ask who wrote all this random XSS stuff in the Shoutbox? I doesn't look like they did anything (they failed at whatever hacking they were trying to achieve) but I would appreciate it If they would tell me who they are?

Link to comment
Share on other sites

alert is javascript and as long as you have something like

<?php
htmlentities($string,ENT_QUOTES);?>

 

 

you are fine. it wil print in html like alert whatever instead of actually being a problem ;)

If I use strip_tags won't it get rid of JS? I will add htmlentities anyway though.

Link to comment
Share on other sites

its still a good idea to delete them.

Yes I deleted them IE is functioning properly after I restarted it.

 

Edit: IE isn't getting the new messages. will try getting rid of htmlentities.

Edit: IE still doesn't get the new messages... something is wrong.

Link to comment
Share on other sites

You might want to use some script to empty the field value (name field) once the user clicks to type in his/her nickname

 

JS

<!-- Form Input Default Value -->
<script type="text/javascript">
function clickclear(thisfield, defaulttext) {
if (thisfield.value == defaulttext) {
thisfield.value = "";
}
}

function clickrecall(thisfield, defaulttext) {
if (thisfield.value == “”) {
thisfield.value = defaulttext;
}
}
</script>

 

example:

<input type="text" name="myfield" value="default text" onclick=”clickclear(this, ‘default text’)” onblur=”clickrecall(this,’default text’)” />

Link to comment
Share on other sites

Input Type Password Autocomplete Enabled

Password type input named pass from unnamedd has autocomplete enabled. An attacker with local access could obtain the cleartext password from the browser cache.

The impact of this vulnerability

Possible sensitive information disclosure

How to fix this vulnerability

The password autocomplete should be disabled in sensitive applications. To disable autocomplete, you may use a code similar to: < INPUT TYPE="password" AUTOCOMPLETE="off" >

 

User credentials are sent in clear text

The impact of this vulnerability

A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection.

How to fix this vulnerability

Because user credentials usually are considered sensitive information, it is recommended to be sent to the server over an encrypted connection.

Link to comment
Share on other sites

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.