darkfreaks Posted December 26, 2008 Share Posted December 26, 2008 ok so there is injection in the error variable how do i fix this ??? <?php $error=htmlentities ("Error+logging+in.+Have+you+created+an+account+yet? +Passwords+are+caSe+SEnsITIvE.",ENT_NOQUOTES); header("Location: $base_url/login.php?game=".urlencode($game)."&error=$error")?> Link to comment https://forums.phpfreaks.com/topic/138436-solved-header-injection/ Share on other sites More sharing options...
darkfreaks Posted December 26, 2008 Author Share Posted December 26, 2008 changed the header haha! Link to comment https://forums.phpfreaks.com/topic/138436-solved-header-injection/#findComment-723836 Share on other sites More sharing options...
darkfreaks Posted December 26, 2008 Author Share Posted December 26, 2008 ok that didnt work either any ideas ??? Link to comment https://forums.phpfreaks.com/topic/138436-solved-header-injection/#findComment-723837 Share on other sites More sharing options...
kenrbnsn Posted December 26, 2008 Share Posted December 26, 2008 You have marked this as "solved". Is it? If not please explain your question better. Ken Link to comment https://forums.phpfreaks.com/topic/138436-solved-header-injection/#findComment-723904 Share on other sites More sharing options...
PFMaBiSmAd Posted December 26, 2008 Share Posted December 26, 2008 Any other ideas about what? In one of your other threads you ware already asked to provide specific information about what is going on in front of you - What is being injected and what is being accomplished by the injection?and What error resulted and what data did it (the test) use? Those pieces of information would help pinpoint what is going on. Your posts are missing information about what you are doing and what the specific results are that you see and know about, but are not communicating for someone else to be able to help with. Link to comment https://forums.phpfreaks.com/topic/138436-solved-header-injection/#findComment-723909 Share on other sites More sharing options...
thetooth Posted December 26, 2008 Share Posted December 26, 2008 ok so there is injection in the error variable how do i fix this ??? <?php $error=htmlentities ("Error+logging+in.+Have+you+created+an+account+yet? +Passwords+are+caSe+SEnsITIvE.",ENT_NOQUOTES); header("Location: $base_url/login.php?game=".urlencode($game)."&error=$error")?> by the looks of what your trying to do i would say its alot easyer to define all your errors in a config first and then use a simple heard redirect that calls it Link to comment https://forums.phpfreaks.com/topic/138436-solved-header-injection/#findComment-723910 Share on other sites More sharing options...
PFMaBiSmAd Posted December 26, 2008 Share Posted December 26, 2008 Here is an answer that will always work, that we have stated many times - All external data cannot be trusted and must be validated by your script to insure it contains what you expect. One recent example - http://www.phpfreaks.com/forums/index.php/topic,231391.msg1072822.html#msg1072822 mysql_real_escape_string() is only effective for stopping sql injection in string data. It does not help when the data is expected to be numeric and the numeric data is followed by an injected sql statement. htmlentities() is only effective in preventing the content being output to the browser from being rendered and operated on by the browser. When that content is sent back to the server as POST/GET/COOKIE data (such as a GET parameter on the end of a redirect URL), it can be anything and must be treated as untrusted and it must be validated again. If your code (in the part you did not post, where the security hole is at) is using $_GET['error'], then you should be making sure that how you are using $_GET['error'] is safe. Security is situation specific. How the data is being used determines what kind of protection it needs and at what point it needs it. You cannot attempt to apply a fixed set of rules and expect them to work in every situation. If that was the case, then you could do things like have a programming language automatically protect against sql injection by escaping external data... Wait, they tried that with the magic_quotes settings and it did not work in all situations and when the data was not used for a database more code and processing time was needed to undo the unnecessary escaping. Magic_quotes was a wasted effort because they were not specific to how the data was being used and the only person who knows how data is being used in any application is the the programmer that is creating that application. It is his responsibility to write code that implements the security needed by that application. Link to comment https://forums.phpfreaks.com/topic/138436-solved-header-injection/#findComment-723927 Share on other sites More sharing options...
kenrbnsn Posted December 26, 2008 Share Posted December 26, 2008 Locked. The OP started another thread... Ken Link to comment https://forums.phpfreaks.com/topic/138436-solved-header-injection/#findComment-724028 Share on other sites More sharing options...
Recommended Posts