Penetration Testing mailing list archives
Magic Quotes question
From: "DokFLeed" <dokfleed () dokfleed net>
Date: Wed, 17 Jan 2007 11:10:25 +0400
Hi, I posted this earlier to webappsec () securityfocus com with no luck , does anyone know how to bypass magic quotes? a proven working way . example is, in such a simple SQL like "SELECT * from USERS WHERE id =$id"; I am looking for ways to by pass magic quotes to inject this INTO OUTFILE '/home/z.php'point is, if magic quotes can stop this, so why is it going to be removed in php6? it can simply stay and be activated or deactivated on will. and if there is a way to by pass, I want to include it in my check GET/POST inputs.
cheers DokFLeed ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW ------------------------------------------------------------------------
Current thread:
- Announcement: The Cross-site Request Forgery FAQ bugtraq (Jan 16)
- Magic Quotes question DokFLeed (Jan 18)
- Re: Magic Quotes question Lynx (Jan 18)
- Re: Magic Quotes question Sir Mordred (Jan 19)
- Re: Magic Quotes question Ronald Chmara (Jan 19)
- Re: Magic Quotes question Justin Ferguson (Jan 19)
- Re: Magic Quotes question Tim (Jan 22)
- Re: Magic Quotes question Sanjay R (Jan 22)
- Wikto and googling Nicolás F . Iglesias (Jan 22)
- Re: Wikto and googling Adviser (Jan 23)
- Re: Wikto and googling Sels, Roger (Jan 23)
- RE: Wikto and googling Michael Starr (Jan 23)
- Magic Quotes question DokFLeed (Jan 18)