Jump to content

please test for security!


ricmetal

Recommended Posts

  • Replies 127
  • Created
  • Last Reply

Top Posters In This Topic

edit as far as injections, looks like it

inject me still produces errors when i type in extra variables on my code that have nothing to do with the db

 

but they are all 302 errors and the db isnt populated, so i guess thats ok

 

Link to comment
Share on other sites

just incase you didnt get my inbox

 

<?php
]echo "<div class=\"msgOk\">" filter_var($_GET[msg],FILTER_SANITIZE_STRING);" </div>"; ?>

 

erase the code i originally gave you, it wont work right. let me know if u still get errors it may be syntax if anything. ;)

Link to comment
Share on other sites

Thers also another XSS vulnerability present with same deals section.

 

You can use it by entering javascript:alert(document.cookie); into the '** I JOIN'  field.

This requires the user to click the link for the attack to happen.

 

Its also displaying the values twice, is that supposed to happen?

Link to comment
Share on other sites

your adddeals.php still has injection try this:

<?php

function clean($var)
{
$var=trim(mysql_real_escape_string(strip_tags($var)));
$var=htmlspecialchars($var,ENT_QUOTES);

return filter_var($var,FILTER_SANITIZE_STRING);
}

$referralForm=clean($_POST['referralForm']);
$dealForm=clean($_POST['dealForm']);
$my_ptcForm=clean($_POST['my_ptcForm']);
$his_ptcForm=clean($_POST['his_ptcForm']);
$contact_userForm=clean($_POST['contact_userForm']);
$recaptcha_challenge_field=clean($_POST['recaptcha_challenge_field']);
$recaptcha_response_field=clean($_POST['recaptcha_response_field'];
$submit=clean($_POST['submit']);
?>

Link to comment
Share on other sites


×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.