Menu

#5 HTML injection in PHP Fusebox

open
nobody
5
2006-01-17
2006-01-17
Anonymous
No

http://site.xxx/fusebox/index.php?fuseaction=<h1><marquee>Halo</marquee></h1>

Vulnerable Code in file fbx_Fusebox3.0_PHP4.0.6.php :

$FB_["rawFA"] = ($attributes["fuseaction"]);
if(ListLen($FB_["rawFA"], ".") == 1 &&
substr($FB_["rawFA"], -1) == ".") {
$Fusebox["fuseaction"] =
"Fusebox.defaultFuseaction";
}

Fix:

$FB_["rawFA"] =
htmlspecialchars($attributes["fuseaction"]);
if(ListLen($FB_["rawFA"], ".") == 1 &&
substr($FB_["rawFA"], -1) == ".") {
$Fusebox["fuseaction"] =
"Fusebox.defaultFuseaction";
}

Discussion


Log in to post a comment.

Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.