Re: This code using _GET exploitable

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



filtered wrote:
Hi,

we have script containing

 <? echo $_GET['studio'] ?>

and

    <?
        $cam = $_GET['cam'];

        if ($cam == '1') {
            echo '<img src="http://example.com"";  />';
        }
   ?>

Is this code prone to XSS attacks or for attacking the local webserver
and if so, how?

$cam isn't used anywhere else.

-a


It certainly is XSS vulnerable through a reflective XSS attack.
clean your input before displaying it.

--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php


[Index of Archives]     [PHP Home]     [Apache Users]     [PHP on Windows]     [Kernel Newbies]     [PHP Install]     [PHP Classes]     [Pear]     [Postgresql]     [Postgresql PHP]     [PHP on Windows]     [PHP Database Programming]     [PHP SOAP]

  Powered by Linux