Jump to content

Recommended Posts

  • Replies 127
  • Created
  • Last Reply

Top Posters In This Topic

just incase you didnt get my inbox

 

<?php
]echo "<div class=\"msgOk\">" filter_var($_GET[msg],FILTER_SANITIZE_STRING);" </div>"; ?>

 

erase the code i originally gave you, it wont work right. let me know if u still get errors it may be syntax if anything. ;)

Thers also another XSS vulnerability present with same deals section.

 

You can use it by entering javascript:alert(document.cookie); into the '** I JOIN'  field.

This requires the user to click the link for the attack to happen.

 

Its also displaying the values twice, is that supposed to happen?

your adddeals.php still has injection try this:

<?php

function clean($var)
{
$var=trim(mysql_real_escape_string(strip_tags($var)));
$var=htmlspecialchars($var,ENT_QUOTES);

return filter_var($var,FILTER_SANITIZE_STRING);
}

$referralForm=clean($_POST['referralForm']);
$dealForm=clean($_POST['dealForm']);
$my_ptcForm=clean($_POST['my_ptcForm']);
$his_ptcForm=clean($_POST['his_ptcForm']);
$contact_userForm=clean($_POST['contact_userForm']);
$recaptcha_challenge_field=clean($_POST['recaptcha_challenge_field']);
$recaptcha_response_field=clean($_POST['recaptcha_response_field'];
$submit=clean($_POST['submit']);
?>


×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.