Full Disclosure mailing list archives
XSS and SQL injection in sNews
From: Alexander Hristov <joffer () gmail com>
Date: Wed, 15 Feb 2006 08:00:03 +0200
Official page : http://www.solucija.com/home/snews/ XSS in comments : just post some comment with <script>alert('XSS TEST by securitydot.net');</script> FIX : put this on 423 line $r = str_replace ("<","<",$r); $r = str_replace (">","&lg",$r); Injection through categories : index.php?category=1%20or%201=2 FIX : put this on 313 line if (ereg('^[0-9]*$' , $category)) Injection through id : index.php?id=0%20or%201=2 FIX : put this on 175 line if (ereg('^[0-9]*$' , $id)) { -- Securitydot.net joffer and DrFrancky _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- XSS and SQL injection in sNews Alexander Hristov (Feb 14)
- <Possible follow-ups>
- XSS and SQL injection in sNews Alexander Hristov (Feb 14)