From: R. M. v. D. <mv...@ca...> - 2003-07-09 17:36:48
|
On Wed, 9 Jul 2003, K. Ono wrote: > Hi Chapi, > > Sure, but unfortunately I do not have the time to look into them all. > If possible, I would like somebody very familiar with XSS and related > security vulnerabilities to take a look at the codes. > > There are really many hacks/modules that look very interesting and should be > integrated to the core, but that's not very esay since some of them lack > making the codes > secure enough. It is very easy to secure them once they are found, but it is > really easily > forgotten as well. One little cross site scripting hole requires another > 2.0.x. ;-) I think all 'xss' vulnerabilities can be addressed simply by placing the construct: if (!defined('XOOPS_ROOT_PATH')) { exit(); } at the top of any file which is not meant to be called directly. (As is done in xoops core now.) Or is this too simplistic a view of the issue? Other vulnerabilities need to be checked as well... e.g. all the queries must be checked that any strings coming from GET/POST/etc args are properly 'escaped/quoted' to prevent 'sql injection' attacks. Also the codes must be check that there are no 'register_globals' vulnerabilities, and also that it works with 'register_globals' set to 'off'. If I have some time I can start to look at some of these. Are there any hacks which should receive priority... i.e. most useful/desired in the community? Best regards, Mike |