Union Tap - Beta 2 - Stop UNION Injections
Date: Saturday, April 24 @ 09:24:24 CEST
Topic: Security


In an earlier press release, I had issued a first Beta fix to fight back Union SQL Injections in Plain Text and Base64 encoding. As mentioned for the initial Beta, false positives were expected. Thanks to you folks, Beta 2 is now available for testing. It eliminates many of those false positives. For those daring to test it, I await your replies.

To install it, open mainfile.php and after the first line: <php please install the following code, or replace the initial Beta with this version of Beta 2 (now coined 'Union Tap'):

//Union Tap
//Copyright Zhen-Xjell 2004 http://nukecops.com
//Beta 2 Code to prevent UNION SQL Injections delivered in Plaintext or Base64.
if (preg_match("/([dW5pb24VUJT0uniNIO]{5})/", rawurldecode($loc=$_SERVER["QUERY_STRING"]), $matches)) {
die("YOU ARE SLAPPED BY <a href=\"http://nukecops.com\">NUKECOPS</a> BY USING '$matches[1]' INSIDE '$loc'.");
}





This article comes from NukeCops
http://www.nukecops.com

The URL for this story is:
http://www.nukecops.com/modules.php?name=News&file=article&sid=1978