|
|
|
|
- Readme First! - Read and follow the rules, otherwise your posts will be closed |
|
|
|
|
|
There are currently, 359 guest(s) and 0 member(s) that are online.
You are Anonymous user. You can register for free by clicking here |
|
|
|
|
|
| The comments are owned by the poster. We aren't responsible for their content. |
| | | | |
No Comments Allowed for Anonymous, please register | | | | |
Re: New hacking attempt on my site!!! (Score: 1) by kipuka on Tuesday, January 13 @ 06:37:09 CET (User Info | Send a Message) | I agree the UA is not very common and as such was effective in diverting attention. The focus though needs to stay on the URL when a visitor adds an off-site domain to it, and the code checked for vulnerabilities if it hasn't already been.
I went back and looked at this a little more. I still don't see someone being able to upload a file this way at least not in 6.9. However, I think you should note:
-- The variable $name is not properly sanitized here before being used in a sql call.
-- The sanitization routine for $_GET variables in mainfile.php lacks a check for single quote usage.
-- As you know already, phpnuke uses globals quite freely. These can be set via $_GET, $_POST, or $_COOKIE. Unless the code specifically limits the method used for setting a variable, whatever you're filtering out in $_GET most likely should be done for $_POST and $_COOKIE too. |
| Parent | | | | | |
|