Jump to content

Need help with security


utspam

Recommended Posts

New to all this - please be gentle.  Need help with securing before testing it here.  Sample code follows:

 

 

//////////////////////

// CODE

 

<?php

 

// CONNECT TO DATABASE

include "config/connect.php";

 

// IF A SEARCH WAS REQUESTED

if (isset($_GET['search']))

{

$search = $_GET['search'];

$search = strip_tags($search);

$search = stripslashes($search);

echo "<title>Searching for $search</title>";

}

 

 

echo "<img src=\"images/logo_480.jpg\"><p>";

echo "Search Listings:";

 

echo "<form method=\"GET\" action=\"searchpage.php\" name=\"listingssearch\">";

echo "<input type=\"text\" name=\"search\">";

echo "<input type=\"Submit\" name=\"Search\" value=\"Search\">";

echo "</form>";

echo "<p>";

 

 

if (isset($_GET['search']))

{

$sql = mysql_query("SELECT * FROM links WHERE approved = '1' AND sitename LIKE '%$search%'");

    while ($row = mysql_fetch_array($sql))

    {

$id = $row["id"];

$company = $row["sitename"];

 

echo "$id : $company<br />";

 

// MORE STUFF HERE

 

echo "- - - - - - - - - - - -<br />";

}

}

 

?>

 

//  CODE

////////////////////

 

It apparently passese the XSS Me tests but not the Access Me tests:

 

= = = = = = = = = = = = = = =

 

Attack Details:

 

    * HTTP Method: SECCOMP

 

The attacked page is dangerously similar to the original page. It is 100% similar. Got access to a resource that should be protected. Server response code: 200 OK.

 

searchpage.php :: Http Method

 

Attack Details:

 

    * HTTP Method: HEAD

 

Got access to a resource that should be protected. Server response code: 200 OK. The attacked page is not very similar to the original page. It is 8.333% similar.

 

= = = = = = = = = = = = = = =

 

I want to learn so don't tell me the answers, but please point me in the right direction.

 

Thanks in advance.

_______________

Link to comment
https://forums.phpfreaks.com/topic/187074-need-help-with-security/
Share on other sites

  • 2 weeks later...

$search = stripslashes($search);

 

I'd suggest reading up on magic quotes as it looks like you're trying to implement code using this deprecated feature. You should be applying mysql_real_escape_string to secure your input strings instead.

 

At the moment you're $search variable is open to SQL injection; even if magic quotes is turned on you're actually removing the slashes it adds to prevent against SQL attacks.

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.