YGN Ethical Hacker Group (lists yehg net)Concrete CMS 5.4.1.1
1. Overview
Concrete CMS 5.4.1.1 and earlier version scripts have cross-site Defects
2. Background
Concrete5 makes running a website easy. Go to any page in your site,And a editing
Jsoncallback filter UTF-7 BOM. However, there is still mhtml XSS injection.Detailed description:
IE6
IE7
Proof of vulnerability:Mhtml: http://survey.finance.sina.com.cn/api/fusioncharts/get_from_data.php? Sid = 48302 & aid = 18099 &
Title: Webmobo News System Blind SQL InjectionAuthor: Eyup CELIK www.2cto.comAffected Versions: All VersionsTest version: All versions are Vulnerability Description Blind SQL Injection can be done using the command inputDefect page:Index.
Title: jakcms pro
Author: EgiX
: Http://www.jakcms.com/
Affected Version n: 2.2.5
Test Platform: Windows 7 and Debian 6.0.2
/*
--------------------------------------------------------
Jakcms pro
------------------------------------------------
To completely prevent websites from being attacked by cross-site command code and Implicit Information Code, the system must check the user's input information and protect the webpage content, avoid unexpected and harmful behaviors.
Attackers
I don't know if it's 0-day. It's a violent vulnerability at the end of last year. Perform the following tests only:
Note that [% pos %] is a number [% cmp %] Which is a hexadecimal character (I am working with my tool ). It is determined that the
From www.0855. TVBy Mr. DzY
The century wind enterprise website management system is a website management system for small and medium-sized enterprises. Its webpage is exquisite and elegant. Strong stability, many functions, security, fast code
During the XSS detection process on a website, multiple search pages call the same function. Most of these variables are not strictly filtered. Most of these variables are typical XSS, for the typical XSS detection site, we have already explained
The so-called CC attack means that the other party uses programs or some agents to continuously simulate a large number of concurrent accesses to your website. As a result, your website cannot be processed and is in a state of downtime. In this
The htmlspecialchars () function in php will The htmlspecialchars () function converts some predefined characters into HTML objects. The predefined characters are: & (And number) becomes & amp;"(Double quotation marks) into & quot;'(Single quotes)
1. filter "" tagsThe ultimate goal of XSS cross-site attacks is to introduce script code to execute in the user's browser. Therefore, the most basic and simple filtering method is to convert the "" mark. Replace (str, "", "& # x3E;") 2. HTML
With CSRF attack we can to send a fake request from the browser of the user, and thus enter to site with the permission of the user and maintain interact with the site like the script is the user himself. A great example of using on CSRF, is bank
Www.2cto.comI have discovered this vulnerability before, And I am helpless. Later I thought of rewrite, which can be processed by matching URLs with regular expressions. Http://www.bkjia.com/dir. asp/diy.jpg For example, this is a diy. asp file that
Mssql injection in error mode 2.1 Basic Information 2.1.1 determine whether injection exists http://yjsc.ahau.edu.cn/web/InfoKindList.aspx?kind=0103 'According to the error echo with single quotation marks, it is found that it is a forward type, and
It is difficult for us to ensure the security of a Web program, because the ghost knows what new vulnerabilities will emerge tomorrow, and the ghost knows whether a module is written by a security-free programmer. Most Web scanners (including the
0x00 background
In this article, the Browser Security-same-origin policy and pseudo-URL domain mentioned the same-origin policy of the Browser, which mentioned that XMLHttpRequest strictly abides by the same-origin policy and cannot be requested
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.