You are here: Re: GIF PHP Exploit « PHP Programming Language « IT news, forums, messages
Re: GIF PHP Exploit

Posted by shimmyshack on 06/22/07 14:28

On Jun 22, 1:41 pm, gosha bine <stereof...@gmail.com> wrote:
> On 22.06.2007 12:57 Schraalhans Keukenmeester wrote:
>
> > It's been mentioned here a couple of times in different threads regarding
> > image uploading. It's not new, but I found a clear explanation of what it
> > is and how to deal with it. Hope it helps some of you.
>
> >http://www.phpclasses.org/blog/post/67-PHP-security-exploit-with-GIF-...
>
> > Best!
> > Sh.
>
> How this exploit is related specifically to GIF files? You can insert
> php code in any file and every upload script that doesn't check file
> extensions is vulnerable.
>
> --
> gosha bine
>
> extended php parser ~http://code.google.com/p/pihipi
> blok ~http://www.tagarga.com/blok

it isnt just a simple question of examining file extensions, see url
below for an example, there are of course others including execution
of php within jpeg comments, or just XSS within images. Some machines
are ok, some are not, depends on your setup, even serving image via
download file might not stop it on some setups.
http://milw0rm.com/video/watch.php?id=58-

 

Navigation:

[Reply to this message]


Удаленная работа для программистов  •  Как заработать на Google AdSense  •  England, UK  •  статьи на английском  •  PHP MySQL CMS Apache Oscommerce  •  Online Business Knowledge Base  •  DVD MP3 AVI MP4 players codecs conversion help
Home  •  Search  •  Site Map  •  Set as Homepage  •  Add to Favourites

Copyright © 2005-2006 Powered by Custom PHP Programming

Сайт изготовлен в Студии Валентина Петручека
изготовление и поддержка веб-сайтов, разработка программного обеспечения, поисковая оптимизация