You need to sanitise your GET variables.
e.g.
http://denby.ukhost-group.co.uk/room.php?one="><img src=http://X.org/X.jpg width="
Where X is Lemonparty, Goatse etc. - take your pic.![]()
dnt no what you mean?
anyroad i got it working fine now
thanks
You need to sanitise your GET variables.
e.g.
http://denby.ukhost-group.co.uk/room.php?one="><img src=http://X.org/X.jpg width="
Where X is Lemonparty, Goatse etc. - take your pic.![]()
<html>
</object>
<OBJECT ID="ChatFrame"
CLASSID="CLSID:982E01D9-0386-441C-B151-83035135A918"
CODEBASE="CHAT.ocx">
foreach ($_GET as $param => $value) {
printf('<PARAM NAME="%s" value="%s">%s',$param,$value,"\n");
}
</OBJECT>
</BODY>
</HTML>
<html>
hmm, I never can get the hang of using that straight off the bat!
I thought of a better way anyway:
PHP:foreach ($_GET as $param => $value) { printf('<param name="%s" value="%s" />',$param,$value); }
I'm saying your script is vulnerable, secure it.
You can sanitise (clean the incoming data; htmlspecialchars() or htmlentities() will do the trick) or validate the input (make sure the incoming data is how you expect it to be; i.e. sure that the <param> attributes are valid).
dont need it to be secure just need it to work
echo '<param name="one" value="'.$_GET['one'].'" />';
echo '<param name="two" value="'.$_GET['two'].'" />';
ugh why would you do this
No, he did a bad job. It's insecure as hell.
foreach ($_GET as $param => $value) {
printf('<param name="%s" value="%s" />',htmlspecialchars($param),htmlspecialchars($value));
}
dont need it to be secure just need it to work