Reply to Re: GIF PHP Exploit

Your name:

Reply:


Posted by gosha bine on 06/22/07 15:41

On 22.06.2007 16:28 shimmyshack wrote:
> On Jun 22, 1:41 pm, gosha bine <stereof...@gmail.com> wrote:
>> On 22.06.2007 12:57 Schraalhans Keukenmeester wrote:
>>
>>> It's been mentioned here a couple of times in different threads regarding
>>> image uploading. It's not new, but I found a clear explanation of what it
>>> is and how to deal with it. Hope it helps some of you.
>>> http://www.phpclasses.org/blog/post/67-PHP-security-exploit-with-GIF-...
>>> Best!
>>> Sh.
>> How this exploit is related specifically to GIF files? You can insert
>> php code in any file and every upload script that doesn't check file
>> extensions is vulnerable.
>>
>> --
>> gosha bine
>>
>> extended php parser ~http://code.google.com/p/pihipi
>> blok ~http://www.tagarga.com/blok
>
> it isnt just a simple question of examining file extensions, see url
> below for an example, there are of course others including execution
> of php within jpeg comments, or just XSS within images. Some machines
> are ok, some are not, depends on your setup, even serving image via
> download file might not stop it on some setups.
> http://milw0rm.com/video/watch.php?id=58-
>

Ok, but this has nothing to do with php. It's just a bug in (some
obsolete version of) internet explorer.

--
gosha bine

extended php parser ~ http://code.google.com/p/pihipi
blok ~ http://www.tagarga.com/blok

[Back to original message]


Удаленная работа для программистов  •  Как заработать на Google AdSense  •  England, UK  •  статьи на английском  •  PHP MySQL CMS Apache Oscommerce  •  Online Business Knowledge Base  •  DVD MP3 AVI MP4 players codecs conversion help
Home  •  Search  •  Site Map  •  Set as Homepage  •  Add to Favourites

Copyright © 2005-2006 Powered by Custom PHP Programming

Сайт изготовлен в Студии Валентина Петручека
изготовление и поддержка веб-сайтов, разработка программного обеспечения, поисковая оптимизация