Table of Contents
php cross-site attack instance analysis, php cross-instance analysis
This PHP file has been detected as a cross-site scripting vulnerability. How to fix it? ? Urgent
Use websaber to evaluate the PHP website for cross-site scripting vulnerabilities
Home Backend Development PHP Tutorial PHP cross-site attack instance analysis, PHP cross-instance analysis_PHP tutorial

PHP cross-site attack instance analysis, PHP cross-instance analysis_PHP tutorial

Jul 13, 2016 am 10:15 AM
php attack

php cross-site attack instance analysis, php cross-instance analysis

The examples in this article describe the principles and prevention techniques of PHP cross-site attacks. Share it with everyone for your reference. The specific method analysis is as follows:

Cross-site attacks are carried out by exploiting some details or bugs in the program. So how can we prevent cross-site attacks? Below is an example of preventing cross-site attacks. I hope it will be helpful to you.

Copy code The code is as follows:
#demo for prevent csrf
/**
* enc
*/
function encrypt($token_time) {
return md5('!@##$@$$#%43' . $token_time);
}
$token_time = time();
$token = encrypt($token_time);
$expire_time = 10;
if ($_POST) {
$_token_time = $_POST['token_time'];
$_token = $_POST['token'];
if ((time() – $_token_time) > $expire_time) {
echo “expired token”;
echo “
”;
}
echo $_token;
echo “
”;
$_token_real = encrypt($_token_time);
echo $_token_real;
//compare $_token and $_token_real
}
?>




test for csrf





” />
” />





By including a verification code in your form, you have virtually eliminated the risk of a cross-site request forgery attack. You can use this flow in any form that needs to perform an action
Of course, it is better to store the token in the session. Here is just a simple example

Simple analysis:

Token attack prevention is also called token. When the user accesses the page, we generate a random token to save the session and form. When the user submits, if the token we obtain is different from the session, we can submit and re-enter the submission. Data

I hope this article will be helpful to everyone’s PHP programming design.

This PHP file has been detected as a cross-site scripting vulnerability. How to fix it? ? Urgent

if($rw_uid = intval($rws[0])) { $rw_uid seems to be a cross-site scripting vulnerability caused by judgment
Example: $_GET['rewrite'] = '123_js';
Then the ideal result according to the judgment method is $_GET['uid'] = 123; $_GET['do'] = 'js';

But if $_GET['rewrite'] = 'js '; According to the judgment result, it is equal to $_GET['do'] = 'js';

This is caused by lax verification. If it is strictly required that the intrusion must be a number_string in this format, then you have to Strictly filter parameters

Use websaber to evaluate the PHP website for cross-site scripting vulnerabilities

The prevention methods are also simple:
1. Program code vulnerabilities, which require security-conscious programmers to fix. Usually, you only know which aspect to fix after the horse is hung;

2. It can also be solved through a security company. In China, security companies such as Sinesafe and NSFOCUS are more professional.

3. "Read", "Write" and "Execute" the server directory permissions. "Whether scripts are allowed", etc. Using the space of a virtual space provider that has been operating for a long time can effectively reduce the chance of being hacked.

I am engaged in the IDC industry. The above are also questions that I often encounter in my daily work. I hope my answers will be helpful to you.

www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/901279.htmlTechArticlephp cross-site attack instance analysis, php cross-instance analysis This article describes the principles and prevention techniques of php cross-site attack . Share it with everyone for your reference. The specific method analysis is as follows: Cross-site attack...
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

CakePHP Project Configuration CakePHP Project Configuration Sep 10, 2024 pm 05:25 PM

In this chapter, we will understand the Environment Variables, General Configuration, Database Configuration and Email Configuration in CakePHP.

PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian Dec 24, 2024 pm 04:42 PM

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

CakePHP Date and Time CakePHP Date and Time Sep 10, 2024 pm 05:27 PM

To work with date and time in cakephp4, we are going to make use of the available FrozenTime class.

CakePHP Working with Database CakePHP Working with Database Sep 10, 2024 pm 05:25 PM

Working with database in CakePHP is very easy. We will understand the CRUD (Create, Read, Update, Delete) operations in this chapter.

CakePHP File upload CakePHP File upload Sep 10, 2024 pm 05:27 PM

To work on file upload we are going to use the form helper. Here, is an example for file upload.

CakePHP Routing CakePHP Routing Sep 10, 2024 pm 05:25 PM

In this chapter, we are going to learn the following topics related to routing ?

Discuss CakePHP Discuss CakePHP Sep 10, 2024 pm 05:28 PM

CakePHP is an open-source framework for PHP. It is intended to make developing, deploying and maintaining applications much easier. CakePHP is based on a MVC-like architecture that is both powerful and easy to grasp. Models, Views, and Controllers gu

CakePHP Creating Validators CakePHP Creating Validators Sep 10, 2024 pm 05:26 PM

Validator can be created by adding the following two lines in the controller.

See all articles