|
Posted by shimmyshack on 06/22/07 14:28
On Jun 22, 1:41 pm, gosha bine <stereof...@gmail.com> wrote:
> On 22.06.2007 12:57 Schraalhans Keukenmeester wrote:
>
> > It's been mentioned here a couple of times in different threads regarding
> > image uploading. It's not new, but I found a clear explanation of what it
> > is and how to deal with it. Hope it helps some of you.
>
> >http://www.phpclasses.org/blog/post/67-PHP-security-exploit-with-GIF-...
>
> > Best!
> > Sh.
>
> How this exploit is related specifically to GIF files? You can insert
> php code in any file and every upload script that doesn't check file
> extensions is vulnerable.
>
> --
> gosha bine
>
> extended php parser ~http://code.google.com/p/pihipi
> blok ~http://www.tagarga.com/blok
it isnt just a simple question of examining file extensions, see url
below for an example, there are of course others including execution
of php within jpeg comments, or just XSS within images. Some machines
are ok, some are not, depends on your setup, even serving image via
download file might not stop it on some setups.
http://milw0rm.com/video/watch.php?id=58-
Navigation:
[Reply to this message]
|