<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title><![CDATA[FrontAccounting forum — PHP Vulnerability Tests]]></title>
		<link>https://frontaccounting.com/punbb/viewtopic.php?id=6568</link>
		<atom:link href="https://frontaccounting.com/punbb/extern.php?action=feed&amp;tid=6568&amp;type=rss" rel="self" type="application/rss+xml" />
		<description><![CDATA[The most recent posts in PHP Vulnerability Tests.]]></description>
		<lastBuildDate>Sun, 04 Dec 2016 17:57:26 +0000</lastBuildDate>
		<generator>PunBB</generator>
		<item>
			<title><![CDATA[PHP Vulnerability Tests]]></title>
			<link>https://frontaccounting.com/punbb/viewtopic.php?pid=26956#p26956</link>
			<description><![CDATA[<p>The FrontAccounting v2.3.25&#039;s webroot folder&#039;s files were passed through the <a href="http://rips-scanner.sf.net">RIPS Scanner</a> and the attached results were obtained on it&#039;s vulnerability. Most if not all are false positives. The $_POST and $_GET variables are washed before usage though they remain in the same variable name causing such scanners to spout such results.</p><div class="quotebox"><blockquote><p>vulnerable example code:</p><p>1: print (&quot;Hello &quot;&nbsp; .&nbsp; $_GET[&quot;name&quot;]);&nbsp; </p><p>proof of concept for execution:</p><p>/index.php?name=&lt;script&gt;alert(1)&lt;/script&gt;</p><p>patch:</p><p>Encode all user tainted data with PHP buildin functions before embedding the data into the output. Make sure to set the parameter ENT_QUOTES to avoid an eventhandler injections to existing HTML attributes and specify the correct charset.</p><p>1: print (&quot;Hello &quot;&nbsp; .&nbsp; htmlentities($_GET[&quot;name&quot;],&nbsp; ENT_QUOTES,&nbsp; &quot;utf-8&quot;);</p></blockquote></div>]]></description>
			<author><![CDATA[null@example.com (apmuthu)]]></author>
			<pubDate>Sun, 04 Dec 2016 17:57:26 +0000</pubDate>
			<guid>https://frontaccounting.com/punbb/viewtopic.php?pid=26956#p26956</guid>
		</item>
	</channel>
</rss>
