filtered wrote:
Hi, we have script containing <? echo $_GET['studio'] ?>
http://www.yourwebsite.org/yourpage.php?studio=<script>alert('xss');</script>
and <? $cam = $_GET['cam']; if ($cam == '1') { echo '<img src="http://example.com"" />'; } ?>
That I don't think is exploitable since you are not doing anything with cam directly but are only acting if it is a string matching '1'.
-- PHP General Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php