XSS via curl

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



My company uses a home-grown formmail script for clients 
<groan>, and someone is using curl to inject HTTP headers and 
spam email addresses, and turn it into an open relay. Yes, I know 
the right answer is to not use a formmail, but I don't make the rules 
here.

Is there a way to detect that a script is being accessed by curl, and 
not by a browser?  ENV ($_SERVER) variables won't work, as 
those can be forged.

Thanks.

Sandy Keathley

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php


[Index of Archives]     [PHP Home]     [Apache Users]     [PHP on Windows]     [Kernel Newbies]     [PHP Install]     [PHP Classes]     [Pear]     [Postgresql]     [Postgresql PHP]     [PHP on Windows]     [PHP Database Programming]     [PHP SOAP]

  Powered by Linux