Register for your free account! | Forgot your password?

You last visited: Today at 07:19

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[Release]Website

Discussion on [Release]Website within the Last Chaos Private Server forum part of the Last Chaos category.

Closed Thread
 
Old   #1
 
Sentence''s Avatar
 
elite*gold: 1
Join Date: Oct 2011
Posts: 1,609
Received Thanks: 2,189
[Release]Website

projekt abgebrochen
Sentence' is offline  
Thanks
2 Users
Old 04/04/2012, 21:39   #2
 
elite*gold: 265
Join Date: Jul 2009
Posts: 735
Received Thanks: 2,147
loggedin.php (mysql injection possible)
Code:
$username =  $_POST["username"];
$passwort = ($_POST["passwort"]);
 
 
$abfrage = "SELECT user_id, passwd FROM bg_user WHERE user_id LIKE '$username' LIMIT 1";

register.php (mysql injection possible)
Code:
$username = $_POST["username"];
$passwort = $_POST["passwort"];
$passwort2 = $_POST["passwort2"];
$user_code = $_POST ["user_code"];
$email = $_POST ["email"];

if($passwort != $passwort2 OR $username == "" OR $passwort == "" OR $user_code == "" OR $email == "" OR $passwort == $email OR $passwort == $user_code OR $passwort == $username)
    {
    echo "Insert error. Please correct it and try again. ";
    exit;
    }
$passwort = ($passwort);
$result = mysql_query("SELECT user_id FROM bg_user WHERE user_id LIKE '$username'");
$result1 = mysql_query("SELECT user_code FROM bg_user WHERE user_code LIKE '$user_code'");
$result2 = mysql_query("SELECT email FROM bg_user WHERE email LIKE '$email'");

admin_loggin.php (mysql injection possible)
Code:
$username = $_POST["username"];
$admin = $_POST["admin"];
$passwort = ($_POST["password"]);


$abfrage = "SELECT user_id, passwd FROM bg_user WHERE user_id LIKE '$username' LIMIT 1";

multiple files : Session hijacking possible. (anyone can login)
Code:
<?php
if(!isset($_SESSION["username"]))
   {
   echo "Please <a href=\"admin_login.php\">Login</a>";
   exit;
   }
?>

changepw.php ( mysql injection possible )
Code:
$user_code = $_POST ["user_code"];
$passwort = $_POST["passwort"];
$newpasswort = $_POST["newpasswort"];

if($passwort == $newpasswort OR $user_code == $newpasswort OR $user_code == "" OR $newpasswort == "" OR $passwort == "")

    {
    echo "Do not use your User Code/old password as new password! Check the fields for completeness!";
    exit;
    }
	
	else
	{
	$eintrag = "UPDATE bg_user SET passwd = ('$newpasswort') WHERE passwd = ('$passwort')";
    $eintragen = mysql_query($eintrag);
donation.php (mysql injection possible)
Code:
$user_code = $_POST["user_code"];
$psc_code = $_POST["psc_code"];
$value = $_POST["value"];

if($user_code == "" OR $psc_code == "" OR $value == "")
    {
    echo "Please fill out all fields";
    exit;
    }

$result = mysql_query("SELECT psc_code FROM t_donation WHERE psc_code LIKE '$psc_code'");
$menge = mysql_num_rows($result);

if($menge == 0)
    {
    $eintrag = "INSERT INTO t_donation (user_code, psc_code, value) VALUES ('$user_code', '$psc_code', '$value')";
    $eintragen = mysql_query($eintrag);

Are u serious with this, or just trying to get people hacked?



Anyone can make a session by himself with some addons on the browser.
Its not really safe to just check if a session exists.
Lets say i make a session named username then im already logged in.
Always confirm the data in the session with the data in the database.
I could make a session with a username, but for example i couldn't make one with the password of that username since i don't know it.
Wizatek is offline  
Thanks
12 Users
Old 04/04/2012, 21:44   #3
 
elite*gold: 4
Join Date: Nov 2010
Posts: 2,461
Received Thanks: 1,481
Wiza Pro^^
dOofkopf!™ is offline  
Thanks
1 User
Old 04/04/2012, 21:51   #4
 
Nifelvind's Avatar
 
elite*gold: 0
Join Date: Sep 2010
Posts: 3,327
Received Thanks: 1,806
Quote:
Originally Posted by wizatek View Post
[COLOR="Red"

Anyone can make a session by himself with some addons on the browser.
Its not really safe to just check if a session exists.
Lets say i make a session named username then im already logged in.
Always confirm the data in the session with the data in the database.
I could make a session with a username, but for example i couldn't make one with the password of that username since i don't know it.
He said he does not want to continue working on the page...so i guess it's no final version which is ready to be put online.
Nifelvind is offline  
Thanks
2 Users
Old 04/04/2012, 21:52   #5
 
elite*gold: 100
Join Date: Feb 2012
Posts: 341
Received Thanks: 294
why do you dont use "mysql_escape_string(variable)" its verry easy ? or check about /'" ... and splitt the variable at the point of /'"...

sry bad english
Drakkon132 is offline  
Old 04/04/2012, 21:53   #6
 
elite*gold: 0
Join Date: May 2008
Posts: 509
Received Thanks: 1,246
Quote:
Originally Posted by Testosteron™ View Post
Wiza Pro^^
Its common sense, none of his inputs are sanitized. Which means your just asking to be hacked. You might as well put "This Site Hackable!" on the main page of the website.
=Warmonger= is offline  
Thanks
4 Users
Old 04/04/2012, 21:55   #7
 
elite*gold: 265
Join Date: Jul 2009
Posts: 735
Received Thanks: 2,147
Quote:
Originally Posted by Drakkon132 View Post
why do you dont use "mysql_escape_string(variable)" its verry easy ? or check about /'" ... and splitt the variable at the point of /'"...

sry bad english
mysql_escape_string is also unsafe, u need atleas mysql_real_escape_string
But even that seems to be not completely safe.

PDO is the best option
Wizatek is offline  
Thanks
2 Users
Old 04/04/2012, 21:56   #8
 
elite*gold: 100
Join Date: Feb 2012
Posts: 341
Received Thanks: 294
Quote:
Originally Posted by wizatek View Post
mysql_escape_string is also unsafe, u need atleas mysql_real_escape_string
But even that seems to be not completely safe.

PDO is the best option
yes but bether than nothing.
Drakkon132 is offline  
Old 04/04/2012, 22:11   #9
 
Sentence''s Avatar
 
elite*gold: 1
Join Date: Oct 2011
Posts: 1,609
Received Thanks: 2,189
Quote:
Originally Posted by wizatek View Post
I know this.. and I've said this ^^ not my problem if someone got hacked
Sentence' is offline  
Old 04/04/2012, 22:15   #10
 
elite*gold: 265
Join Date: Jul 2009
Posts: 735
Received Thanks: 2,147
So u know this, and u still release it like that with the intention to hack the people who use it ?

Reported
Wizatek is offline  
Thanks
3 Users
Old 04/04/2012, 22:16   #11
 
elite*gold: 0
Join Date: May 2008
Posts: 509
Received Thanks: 1,246
Quote:
Originally Posted by Drakkon132 View Post
why do you dont use "mysql_escape_string(variable)" its verry easy ? or check about /'" ... and splitt the variable at the point of /'"...

sry bad english
Striping slashes doesn't sanitize data, it removes slashes which is in effect de-sanitizing the data.
Quote:
Originally Posted by wizatek View Post
mysql_escape_string is also unsafe, u need atleas mysql_real_escape_string
But even that seems to be not completely safe.

PDO is the best option
You could just pass the query through a written function to escape all the nonsense characters out of it, and it would still be perfectly secure. Tho it is better to use PDO or MySQLi Prepare.
=Warmonger= is offline  
Old 04/04/2012, 22:16   #12
 
Sentence''s Avatar
 
elite*gold: 1
Join Date: Oct 2011
Posts: 1,609
Received Thanks: 2,189
Quote:
Originally Posted by wizatek View Post
So u know this, and u still release it like that with the intention to hack the people who use it ?

Reported
Not rly... READ, THINK, POST!!!
Sentence' is offline  
Thanks
1 User
Old 04/04/2012, 22:25   #13


 
Yannikin's Avatar
 
elite*gold: 17
Join Date: Jan 2010
Posts: 6,067
Received Thanks: 4,733
I dont see the the problem, he wrote that the homepage is hackable. Maybe someone can do something with it, dont care.
Yannikin is offline  
Thanks
4 Users
Old 04/04/2012, 22:45   #14
 
Nev.'s Avatar
 
elite*gold: 0
Join Date: Nov 2011
Posts: 444
Received Thanks: 582
Quote:
Originally Posted by Yannikin View Post
I dont see the the problem, he wrote that the homepage is hackable. Maybe someone can do something with it, dont care.


Er hat Bewusst eine Homepage released die absolut Unsicher ist und JEDER, der nur halbwegs kentniss mit der Materie hat Sie einfach Hacken kann. Wo ist der Sinn eine Halbfertige HP mit Sicherheitslücken zu Releasen ? Ohne Wizatek's Post würden viele im nachhinein rumheulen "Ich wurde gehackt" etc.


Wäre ja Lustig wenn jeder hier sein halbfertiges werk, was zudem noch Sicherheits mängel aufweißt Releasen würde. Btw das Rote wurde im nachhinein editiert.
Nev. is offline  
Thanks
1 User
Old 04/04/2012, 22:48   #15
 
Sentence''s Avatar
 
elite*gold: 1
Join Date: Oct 2011
Posts: 1,609
Received Thanks: 2,189
Quote:
Originally Posted by Nev. View Post
Er hat Bewusst eine Homepage released die absolut Unsicher ist und JEDER, der nur halbwegs kentniss mit der Materie hat Sie einfach Hacken kann. Wo ist der Sinn eine Halbfertige HP mit Sicherheitslücken zu Releasen ? Ohne Wizatek's Post würden viele im nachhinein rumheulen "Ich wurde gehackt" etc.


Wäre ja Lustig wenn jeder hier sein halbfertiges werk, was zudem noch Sicherheits mängel aufweißt Releasen würde. Btw das Rote wurde im nachhinein editiert.
JETZT LERN HALT LESEN !!! ICH SCHRIEB DOCH DAS ICH EINFACH KEINE LUST MEHR HABE !!! VIELLEICHT FINDET SICH JA WER DER LANGEWEILE HAT UND MEIN PROJEKT WEITERFÜHREN WILL BUT WAYNE..
Sentence' is offline  
Thanks
6 Users
Closed Thread


Similar Threads Similar Threads
[Release] My first Photoshop Website release.
03/12/2010 - CO2 Weapon, Armor, Effects & Interface edits - 4 Replies
Here's my first website release: Only the photoshop GIF file will be attached, edit it and add several buttons as links, put your server banner at the top and edit the left hand side of the archer adding personal text e.g server info, stats etc. :] Thanks would be appreciated if you use it :) http://i44.tinypic.com/2sb1ke0.gif
(Release)My first WebSite
06/01/2009 - CO2 PServer Guides & Releases - 9 Replies
Hi people I'm here for you to announce my new and first website ... Download below : FirstWebSite download here Tutorial below : (1)Download the "RAR" file above...



All times are GMT +1. The time now is 07:20.


Powered by vBulletin®
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2026 elitepvpers All Rights Reserved.