Jump to content

please test for security!


ricmetal

Recommended Posts

  • Replies 127
  • Created
  • Last Reply

Top Posters In This Topic

just incase you didnt get my inbox

 

<?php
]echo "<div class=\"msgOk\">" filter_var($_GET[msg],FILTER_SANITIZE_STRING);" </div>"; ?>

 

erase the code i originally gave you, it wont work right. let me know if u still get errors it may be syntax if anything. ;)

Thers also another XSS vulnerability present with same deals section.

 

You can use it by entering javascript:alert(document.cookie); into the '** I JOIN'  field.

This requires the user to click the link for the attack to happen.

 

Its also displaying the values twice, is that supposed to happen?

your adddeals.php still has injection try this:

<?php

function clean($var)
{
$var=trim(mysql_real_escape_string(strip_tags($var)));
$var=htmlspecialchars($var,ENT_QUOTES);

return filter_var($var,FILTER_SANITIZE_STRING);
}

$referralForm=clean($_POST['referralForm']);
$dealForm=clean($_POST['dealForm']);
$my_ptcForm=clean($_POST['my_ptcForm']);
$his_ptcForm=clean($_POST['his_ptcForm']);
$contact_userForm=clean($_POST['contact_userForm']);
$recaptcha_challenge_field=clean($_POST['recaptcha_challenge_field']);
$recaptcha_response_field=clean($_POST['recaptcha_response_field'];
$submit=clean($_POST['submit']);
?>

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.