<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
	<title type="html"><![CDATA[FrontAccounting forum — PHP Vulnerability Tests]]></title>
	<link rel="self" href="https://frontaccounting.com/punbb/extern.php?action=feed&amp;tid=6568&amp;type=atom" />
	<updated>2016-12-04T17:57:26Z</updated>
	<generator>PunBB</generator>
	<id>https://frontaccounting.com/punbb/viewtopic.php?id=6568</id>
		<entry>
			<title type="html"><![CDATA[PHP Vulnerability Tests]]></title>
			<link rel="alternate" href="https://frontaccounting.com/punbb/viewtopic.php?pid=26956#p26956" />
			<content type="html"><![CDATA[<p>The FrontAccounting v2.3.25&#039;s webroot folder&#039;s files were passed through the <a href="http://rips-scanner.sf.net">RIPS Scanner</a> and the attached results were obtained on it&#039;s vulnerability. Most if not all are false positives. The $_POST and $_GET variables are washed before usage though they remain in the same variable name causing such scanners to spout such results.</p><div class="quotebox"><blockquote><p>vulnerable example code:</p><p>1: print (&quot;Hello &quot;&nbsp; .&nbsp; $_GET[&quot;name&quot;]);&nbsp; </p><p>proof of concept for execution:</p><p>/index.php?name=&lt;script&gt;alert(1)&lt;/script&gt;</p><p>patch:</p><p>Encode all user tainted data with PHP buildin functions before embedding the data into the output. Make sure to set the parameter ENT_QUOTES to avoid an eventhandler injections to existing HTML attributes and specify the correct charset.</p><p>1: print (&quot;Hello &quot;&nbsp; .&nbsp; htmlentities($_GET[&quot;name&quot;],&nbsp; ENT_QUOTES,&nbsp; &quot;utf-8&quot;);</p></blockquote></div>]]></content>
			<author>
				<name><![CDATA[apmuthu]]></name>
				<uri>https://frontaccounting.com/punbb/profile.php?id=364</uri>
			</author>
			<updated>2016-12-04T17:57:26Z</updated>
			<id>https://frontaccounting.com/punbb/viewtopic.php?pid=26956#p26956</id>
		</entry>
</feed>
