Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



ahhh, fragment identifiers make sense to browsers only. they are not
send to the server

On 1/4/07, der wert <derwert@xxxxxxxxxxx> wrote:

The best solution I see would be to keep all pdf files in a non-web
accessible location on the web server, then have all the pdf files outputed
through a script such as a php script. In php you can check the what the
REQUEST_URI is, if it isn't equal to what you were expecting which would
mean extra parameters were taken away or added then you could just have the
php script not output the pdf file since that would mean someone had been
tampering with the URI.

D

________________________________
Get free, personalized online radio with MSN Radio powered by Pandora. Try
it!


--
pdp (architect) | petko d. petkov
http://www.gnucitizen.org

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux