Re: Data injection problems [message #169587 is a reply to message #169586] |
Sat, 18 September 2010 14:42 |
Luuk
Messages: 329 Registered: September 2010
Karma:
|
Senior Member |
|
|
On 18-09-10 16:26, Stephan Bird wrote:
> On Sat, 18 Sep 2010 11:32:24 +0200 in
> 1l199652q821h5celav9s6sv2sjbl2v943(at)mfesser(dot)de, Michael Fesser wrote:
>
>> .oO(Michael Fesser)
>>
>>> Same here. I don't have the time right now to investigate a bit further,
>>> but I see at least some problems in the PHP code. At the end there are
>>> includes which include files via HTTP, even if they're on the same
>>> server. While this not only causes a lot of overhead, it could also be
>>> possible that somewhere else in the code there might be a code injection
>>> vulnerability. Or the server was compromised and automatically adds this
>>> code, unless it recognizes some know user agents. As said - in my Opera
>>> the code is clean.
>>
>> Short addition: Opera and Firefox show clean code, Lynx gets the spam.
>>
>> And BTW the page is also vulnerable to cross-site scripting because of
>> things like this:
>>
>> […] value="<?php echo $_REQUEST['backpack'] ?> […]
>>
>
> Thanks for this - any way to harden against this? I was aiming to return
> to the form in the case of missing data with previous entries still filled
> out, otherwise to submit.
>
> I have changed the password, re-uploaded as suggested upstream but the
> spurious links come back - does this suggest a problem with my server then?
>
> Stephan
>
yes,
But the links in the current page (updated in September) are the same
links as where show in the previous page (updated in August)
So, you should check your server for weird processes and/or files..
--
Luuk
|
|
|