Register for your free account! | Forgot your password?

You last visited: Today at 00:04

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



M2Raise.ml - PHP Platform! VERSION 1.0

Discussion on M2Raise.ml - PHP Platform! VERSION 1.0 within the Metin2 PServer Designs, Websites & Scripts forum part of the Metin2 Private Server category.

Reply
 
Old   #1
 
elite*gold: 0
Join Date: May 2015
Posts: 6
Received Thanks: 1
Post M2Raise - OPEN-SOURCE PHP PLATFORM - 04.06.2015 EDIT

I request to close this Topic. The platform is going back to development stage.
wildramen is offline  
Old 06/03/2015, 00:37   #2

 
elite*gold: 0
Join Date: Feb 2008
Posts: 2,754
Received Thanks: 1,748
Looks pretty suspicious.
A nobody who releases a new homepage cms completely free which is strangely obfuscated by some weired "crypter".

Without offending you I'd bet $5 that it contains some backdoors or at least security flaws somewhere in there which nobody can find.
Computerfreek is offline  
Thanks
1 User
Old 06/03/2015, 03:56   #3
 
elite*gold: 1
The Black Market: 127/0/0
Join Date: Dec 2013
Posts: 3,467
Received Thanks: 720
Hat bei mir ein Virus.

K.A.K.A.S.H.I is offline  
Thanks
1 User
Old 06/03/2015, 06:24   #4
 
elite*gold: 0
Join Date: May 2015
Posts: 6
Received Thanks: 1
Quote:
Originally Posted by K.A.K.A.S.H.I View Post
Hat bei mir ein Virus.

No, it's not a virus. Try something like virustotal.com, the result will show the truth. Also, it's just compiled and archived, so my PC is a clean environment.

Quote:
Originally Posted by Computerfreek View Post
Looks pretty suspicious.
A nobody who releases a new homepage cms completely free which is strangely obfuscated by some weired "crypter".

Without offending you I'd bet $5 that it contains some backdoors or at least security flaws somewhere in there which nobody can find.
Somebody told me that it's better to get off the obfuscate system and make it open source. Well, i guess it's a good idea, but all the inputs in the forms are escaped and the GET variables for pages are also escaped. I guess there are no backdoors.
The only thing i've missed is an IOSEC HTTP Security tool, but it will come in the next version. This is a real snap.
wildramen is offline  
Old 06/03/2015, 15:51   #5
 
Gl0bal's Avatar
 
elite*gold: 8
Join Date: Oct 2010
Posts: 564
Received Thanks: 906
Abgesehen davon das der Code "compliled" ist, wenn man das so nennen darf, hat das Ding mehrere Probleme die einem beim erstem Blick auffallen, auch wenn man von dem Virus absieht.
1. Es nutzt die alte Mysql Schnittstelle
2. Es hat keine Plugin Schnittstelle, wenn man schon versucht sein cms zu crypten, dann ist sowas unbedingt von Nöten
3. Es hat einen prozeduralen Programmierstil, wer heute noch ein größeres Stück Code so schreibt, macht irgendwas falsch.

Mein Fazit:
das Hen CMS von 2010 ist besser.

PS: Die PayPal-Integration kann auch nur jmd nutzen, der ein PayPal Geschäftskonto hat und ich denke das haben die wenigsten hier.

MfG
Gl0bal is offline  
Thanks
2 Users
Old 06/03/2015, 16:18   #6

 
.Ɓurly's Avatar
 
elite*gold: 35
Join Date: Apr 2014
Posts: 992
Received Thanks: 1,647
I won't use it. But because no one said it before: Thanks for releasing.

Kind Regards
.Ɓurly is offline  
Old 06/03/2015, 17:20   #7
 
Gl0bal's Avatar
 
elite*gold: 8
Join Date: Oct 2010
Posts: 564
Received Thanks: 906
Quote:
Originally Posted by Lord Metho View Post
Ich frage mich, was daran falsch ist...? Könntest du mir die "decompiled2 geben? Damit ich's selber beurteilen kann, denn die Argumente, die du bringst, entsprechen nur denen, die man beim !HEN bringt, also wieso ist !HEN besser?
ich habe keine decompliled version.
Ich denke jeder der die objektorientierte Programierung versteht, der wird dir das bestätigen:
Code ist leichter wiederverwendbar, leichter wartbar... wtf warum schreibe ich das informier dich doch selber jede Quelle des Internets wird dir sagen, das oop in größeren Projekten heutzutage unabdingbar ist. Nen mir mal ein aktuelles Framework, was darauf verzichtet.
Ich bin mir nicht sicher, ob du das ernst meinst. Du nennst dich doch selber Php-Entwickler, da wirst du doch wohl das Konzept der objektorientierten Programmierung verstehen.

Das Hen! CMS ist sicher. Es ist vielleicht nicht schön, aber sicher, was ich bei diesem Ding nicht sagen kann.

Es ist OpenSource und dadurch erweiterbar, was hier nicht der Fall ist.

Das macht es für mich besser (Auch wenn es trotzdem nicht mehr zeitgemäß ist (siehe meinen Blog)).
Gl0bal is offline  
Thanks
3 Users
Old 06/03/2015, 20:10   #8


 
elite*gold: 0
Join Date: Aug 2013
Posts: 1,713
Received Thanks: 1,389
Quote:
Originally Posted by Lord Metho View Post
OOP ist schon besser. Aber deswegen grade zu motzen ^^. Ich benutze eigentlich nur OOP, aber wem's nicht zusagt...

Was du zu OpenSource sagst, da kann ich dir zustimmen, aber wenn du selbst in PHP Programmierst weisst du das es von der Struktur her, in den beiden Schnittstellen zu mysql einfach fast keinen Unterschied macht. Wenn man der Sch* eine goldenen Krone gibt, bleibt's Sch* mit einer goldenen Krone. (<- Ich finde jedoch, PDO ist auch nicht die Lösung). Ich will's mir aber zuerst angucken, bevor ich wirklich urteile.

Das Gefühl sagt mir aber es ist ein "gemodetes" !HEN...
Wenn du OOP-Codest wüstest du das mysqli in Punkto "sicherheit" einen
enormen Schritt nach vorne gemacht hat, gegenüber mysql.
Und was bringt dir ein compiled CMS wenn du nichts daran verändern kannst?
/exit is offline  
Old 06/03/2015, 20:49   #9
 
elite*gold: 0
Join Date: May 2015
Posts: 6
Received Thanks: 1
I've read all your suggestions and this short-talking time gave me some reasons why i should go back to an open-source code. Well, i understand the fact that people cannot trust each other, and that's fine because i realised the fact that i wouldn't use this if it would be coded. The only reason why i obfuscated it ( not compiled, it's a misunderstanding here for me ) it's because any form of profit should be protected. I should go back and edit all the versions and stuff like this, so this post will be hardly edited and hopefully, i will expand my project.
To be honest, it's hard to understand the choices of another CMS - every website has a great support for coding, good community to talk about, but the hard work and every night lost doing this project.
That's fine, these suggestions are hardly the best i can get yet from experienced people who does programming as well.

So, back to work, i should get some stuff to fix, like this thread, maybe i will launch a github repository and it will be opened for every mind around the globe.
Thanks a lot! ^^ Best regards.
wildramen is offline  
Thanks
1 User
Old 06/04/2015, 01:10   #10
 
elite*gold: 20
Join Date: Dec 2014
Posts: 169
Received Thanks: 59
Empfehlenswert wäre ebenso die Datenbank-Verbindungen etc. mit PDO zu machen
Bently. is offline  
Old 06/04/2015, 06:38   #11
 
Mashkin's Avatar
 
elite*gold: 44
Join Date: May 2010
Posts: 2,053
Received Thanks: 1,747
PHP Code:
// inc/func.core.php
// ESCAPE A STRING BY REPLACING MALICIOUS CHARACTERS
function escapeString($var)
{
    return 
str_replace(array('//''\\'"\0""\n""\r""'"'"''\x1a'"<script>""</script>",
        
"<script"";","!""#""%""&""DROP""INSERT""ALTER""SHUTDOWN""UPDATE""update",
        
"drop""insert""alter""shutdown""--""\'\'"), ""$var);
}

// code/admin_connect.php
$login escapeString($_POST['login']);

$query mysql_query("SELECT * FROM ".ACCOUNT.".account WHERE login = '".$login."' AND password = PASSWORD('".$password."') AND web_admin > 0"); 
Notice the lack of secure input escaping, which will easily allow for an SQL injection vulnerability.
Even the age-old mysql plugin has a proper escaping method, .
While in theory, your escaping method does the same thing (plus a bit more), it does not take into account certain implicit conversions that MySQL may do, most prominently to convert unicode quotation marks to local encoding quotation marks (read on and in OWASP presentation).
MySQL's mysql_real_escape_string() knows how a string might be affected be implicit conversion, your filter doesn't.

Even Hennink's code used proper escaping in most places, so it isn't wrong to assume his code is safer in this instance.

Replacing all occurences of INSERT, UPDATE, etc.and insert, update, etc. is pointless, because InSeRt works just the same (SQL keywords are case-insensitive) and will slip through your filter.

That's for SQL injection. There are more flaws to your filter/escaping method regarding XSS (cross-site-scripting). PHP has native escaping methods for user-provided content embedded in HTML, e.g. . Read the .

I won't discuss procedural style and won't rage about using oldschool mysql plugin, I won't even talk about SQL prepared statements. Find some cheat sheets and recommendations, e.g. on OWASP, yourself.
Mashkin is offline  
Thanks
7 Users
Old 06/04/2015, 06:44   #12
 
elite*gold: 0
Join Date: May 2015
Posts: 6
Received Thanks: 1
Quote:
Originally Posted by Mashkin View Post
PHP Code:
// inc/func.core.php
// ESCAPE A STRING BY REPLACING MALICIOUS CHARACTERS
function escapeString($var)
{
    return 
str_replace(array('//''\\'"\0""\n""\r""'"'"''\x1a'"<script>""</script>",
        
"<script"";","!""#""%""&""DROP""INSERT""ALTER""SHUTDOWN""UPDATE""update",
        
"drop""insert""alter""shutdown""--""\'\'"), ""$var);
}

// code/admin_connect.php
$login escapeString($_POST['login']);

$query mysql_query("SELECT * FROM ".ACCOUNT.".account WHERE login = '".$login."' AND password = PASSWORD('".$password."') AND web_admin > 0"); 
Notice the lack of secure input escaping, which will easily allow for an SQL injection vulnerability.
Even the age-old mysql plugin has a proper escaping method, mysql_real_escape_string().
While in theory, your escaping method does the same thing (plus a bit more), it does not take into account certain implicit conversions that MySQL may do, most prominently to convert unicode quotation marks to local encoding quotation marks (read on and in OWASP presentation).
MySQL's mysql_real_escape_string() knows how a string might be affected be implicit conversion, your filter doesn't.

Even Hennink's code used proper escaping in most places, so it isn't wrong to assume his code is safer in this instance.

Replacing all occurences of INSERT, UPDATE, etc. and insert, update, etc.is pointless, because InSeRt works just the same (SQL keywords are case-insensitive) and will slip through your filter.


I won't rage on procedural style and using oldschool mysql plugin, I won't even talk about SQL prepared statements. Find some cheat sheets and recommendations, e.g. on OWASP, yourself.
Will it be better if i would change the actual code with this?

Code:
function escapeString($var)
{
    return mysql_real_escape_string(str_replace(array('//', '\\', "\0", "\n", "\r", "'", '"', '\x1a', "<script>", "</script>", "<script", ";","!", "#", "%", "&", "DROP", "INSERT", "ALTER", "SHUTDOWN", "UPDATE", "update", "drop", "insert", "alter", "shutdown", "--", "\'\'"), "", $var));
}
wildramen is offline  
Old 06/04/2015, 16:01   #13
 
elite*gold: 0
Join Date: May 2015
Posts: 6
Received Thanks: 1
Quote:
Originally Posted by Lord Metho View Post
No, you can use intern functions from PHP like strip_tag() htmlentities() htmlspecialchars() fgetss() or the opinion like htmlentities_decode() ...for a connexion with PDO = PDO::quote() <- A public function. To use it set a namespace.... You can also use prepared Arguments. But never use user-defined functions. There is also filter_var(_input) for Requests.
So the fact that i wanted to escape strings using a str_replace() is a bad idea. Then i should read more about this type of security before i'm in. It's pretty complicated and i am not very familiarised with the public namespaces and public functions. Thanks a lot! You rock!
wildramen is offline  
Old 06/04/2015, 23:40   #14

 
iKyroja :>'s Avatar
 
elite*gold: 20
Join Date: May 2010
Posts: 2,792
Received Thanks: 1,988
i don't recommend to use it!
mysql_ and may some other functions are outdated.
I don't know why people still code prozedural in projects like this.
You realy should take a look at OOP.
iKyroja :> is offline  
Old 06/05/2015, 06:45   #15
 
Mashkin's Avatar
 
elite*gold: 44
Join Date: May 2010
Posts: 2,053
Received Thanks: 1,747
Quote:
Originally Posted by wildramen View Post
So the fact that i wanted to escape strings using a str_replace() is a bad idea. Then i should read more about this type of security before i'm in. It's pretty complicated and i am not very familiarised with the public namespaces and public functions. Thanks a lot! You rock!
Escaping and input sanitaziation are complex topics.

Why do you want to escape data?
Data is usually inserted into other data that might have a meaning (e.g. an SQL query, JavaScript code or HTML markup) and a syntax. When data is inserted into this syntax, it might break or alter its meaning.

In HTML and JS (and CSS as well), this can just break your web page's layout, or lead to cross-site scripting (XSS) vulnerabilities because someone has control over what happens in a page visitor's browser when she loads your page.

Think about guestbook system, where the data one user enters will be displayed to other users:
HTML Code:
<p class="comment"></p>
Now an attacker adds a comment including HTML markup and gains control over other users' browsers:
HTML Code:
<p class="comment"><script>alert('XSS')</script></p>
The same can happen with SQL when a user's input string can "escape" the string delimiters (quotation marks) and manipulate the instructions of the query.

Every scenario (HTML, JS, SQL etc.) has different requirements that escaping must meet to be secure.
For SQL quotation marks are dangerous, for HTML content brackets ('<' and '>') are dangerous, and for HTML attributes there is a whole pallette of possibly dangerous literals.

The conclusion is that a good escaping method needs to know the exact context where the escaped data will be injected (e.g. the SQL quotation mark conversion I mentioned in my earlier post).
This is the reason why there are individual escaping methods for different use cases (e.g. htmlspecialchars() for HTML and mysql_real_escape_string() for MySQL strings).


So start using different escaping methods for different use cases, and use the methods that already exist and are known/proven/expected to be secure.
Mashkin is offline  
Thanks
3 Users
Reply

Tags
app, css, html, php, web


Similar Threads Similar Threads
Help us develop 1v1 CS:GO platform with betting
05/10/2015 - Counter-Strike - 0 Replies
Greetings players of Counter-Strike: Global Offensive. We are a group of students at Faculty of Computer and Information Science from University of Ljubljana, Slovenia and passionate fans of CS:GO. Because competitiveness is an inevitable part of multiplayer first person online shooters, we decided to emphasize the quality of individuals by developing a platform where one could challenge other players in 1 versus 1 game mode. An important part of this platform (the funnest one really) is the...
Your platform
04/14/2015 - DarkOrbit - 9 Replies
I just want to ask u which platform do u use(your operating system). :rolleyes:
[Selling] FIFA 15 Coins every Platform
01/21/2015 - Fifa Trading - 0 Replies
FIFA 15 COIN SHOP FIFA 15 COINS FOR EVERY PLATFORM, UP TO 10 MILLION COINS IN STOCK PRICES ARE NOT 100% UP TO DATE EVERY TIME AS THEY CHANGE FAST, FOR LIVE PRICES CONTACT ME ON SKYPE! 100k Coins PC ~ 1,20€ 100k Coins PS4 ~ 2,20€ 100k Coins XBox ~ 2,75€
moon platform
03/04/2009 - Conquer Online 2 - 1 Replies
i need to know how can i go to this the place (moon platform ? plz i need your hleps



All times are GMT +1. The time now is 00:04.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.