Jump to content

Recommended Posts

Admin Access:

I got your username and password with a cookie stealer.

 

Array:

http://www.dreamshowstudios.net/programs.php?id[]

 

Array:

http://dreamshowstudios.net/viewpic.php?full[]

 

Cross Site Scripting:

http://dreamshowstudios.net/pm.php?dignore=<marquee><h1>vulnerable</marquee>

 

Cross Site Scripting:

http://www.dreamshowstudios.net/programs.php?id=<marquee><h1>vulnerable</marquee>

 

Cross Site Scripting:

http://www.dreamshowstudios.net/viewpic.php?pic="><marquee><h1>vulnerable</marquee>

 

Cross Site Scripting:

There is Cross Site Scripting if you send a message that contains code.

 

Cross Site Scripting:

There is Cross Site Scripting in the Shoutbox.

 

Cross Site Scripting:

There is Cross Site Scripting when you register if the fields contain code.

 

Directory Transversal:

http://www.dreamshowstudios.net/viewpic.php?pic=../Images/splash

 

Drop Down Menu:

If you edit the drop down menu on http://www.dreamshowstudios.net/viewpic.php you can submit arbitrary values.

 

Full Path Disclosure:

http://www.dreamshowstudios.net/forums/index.php?action[]

Notice: Array to string conversion in /home/dreamsh/public_html/forums/Sources/QueryString.php on line 245

 

Notice: Array to string conversion in /home/dreamsh/public_html/forums/Sources/QueryString.php on line 247

 

Full Path Disclosure:

http://www.dreamshowstudios.net/forums/index.php?board[]

Notice: Array to string conversion in /home/dreamsh/public_html/forums/Sources/QueryString.php on line 198

 

Full Path Disclosure:

http://www.dreamshowstudios.net/members.php?&pg=-1

Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /home/dreamsh/public_html/members.php on line 116

 

Full Path Disclosure:

http://www.dreamshowstudios.net/members.php?&pg[]

Fatal error: Unsupported operand types in /home/dreamsh/public_html/members.php on line 108

 

Full Path Disclosure:

http://www.dreamshowstudios.net/pm.php?pto=Tester

Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /home/dreamsh/public_html/pm.php on line 290

 

Full Path Disclosure:

There is Full Path Disclosure in the Shoutbox.

Fatal error: Cannot redeclare pagination() (previously declared in /home/dreamsh/public_html/functions.php:2) in /home/dreamsh/public_html/functions.php on line 2

 

Full Path Disclosure:

There is Full Path Disclosure when you register.

Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /home/dreamsh/public_html/register.php on line 117

 

Includes Directory:

http://www.dreamshowstudios.net/h2/

 

Insecure Cookie:

You shouldn't put the password in the cookie.

 

Insecure Cookie:

You shouldn't put the username in the cookie.

 

Maximum Length:

If you edit the input boxes in your profile you can remove the maximum lengths.

 

PHP Source Code Disclosure:

http://www.dreamshowstudios.net/backup/

 

PHP Source Code Disclosure:

You have added deletexss('A Distraction04') to your ignorelist

 

SQL Injection:

http://www.dreamshowstudios.net/pm.php?func=del&mid=52 AND 1=1

http://www.dreamshowstudios.net/pm.php?func=del&mid=52 AND 1=2

 

SQL Injection:

http://www.dreamshowstudios.net/pm.php?pto=Tester&mid=48 AND 1=1

http://www.dreamshowstudios.net/pm.php?pto=Tester&mid=48 AND 1=2

 

SQL Injection:

http://www.dreamshowstudios.net/programs.php?id=3 AND 1=1

http://www.dreamshowstudios.net/programs.php?id=3 AND 1=2

Link to comment
https://forums.phpfreaks.com/topic/59043-security-test/#findComment-293094
Share on other sites

blind sql injection ??? how could this happen all it does is take info from the db on that page if that actually i think it just uses the $_GET to name the dl

 

also how do i fix the xss bug?

 

http://dreamshowstudios.net/programs.php?id[]

 

Unknown column 'Array' in 'where clause'

 

what would this do??

Link to comment
https://forums.phpfreaks.com/topic/59043-security-test/#findComment-293097
Share on other sites

Well using something like:

 

$usern=stripslashes($usern);

$usern=strip_tags($usern);

$usern=mysql_real_escape_string($usern);

 

etc (make it a function if you use it a lot)

 

will filter the input and make it hard to xss/sql inject... Making an array and using str_replace($arrayvariable, " ", "$whattofilter")

and also help if you dont want a couple different characters/words allowed (but can by bypassed)

 

EDIT: goodnight.

Link to comment
https://forums.phpfreaks.com/topic/59043-security-test/#findComment-293117
Share on other sites

 

nope...

 

Yes

http://dreamshowstudios.net/pm.php?pto=Tester&mid=48 UNION ALL SELECT null, null, null FROM whatever

 

There lol fixed now just didnt add the var it was still $_GET

Link to comment
https://forums.phpfreaks.com/topic/59043-security-test/#findComment-293135
Share on other sites

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.