News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Secunia.com:
TCExam PHP Code Execution and Cross-Site Scripting
May 01, 2007 @ 14:18:00

TCExam users will definitely want to pay attention to this latest advisory posted by Secunia detailing a PHP code execution and cross-site scripting issue that's been found:

rgod has discovered two vulnerabilities in TCExam, which can be exploited by malicious people to conduct cross-site scripting attacks or to compromise a vulnerable system.

The two issues is related to two different inpus not being handled properly - the mishandling of the SessionUserLang cookie and the _SERVER[SCRIPT_NAME] value. Neither of these are being sanitized.

This issue effects users of the TCExam 4.x series but a new version, 4.1.000, has already been released and made available for download.

0 comments voice your opinion now!
tcexam crosssitescripting xss execution sanitize tcexam crosssitescripting xss execution sanitize


blog comments powered by Disqus

Similar Posts

DeveloperDrive.com: What Web Developers Need to Know About Cross-Site Scripting

Secunia.com: phpMyAdmin Cross-Site Scripting Vulnerabilities

Secunia.com: PHP "glob()" Code Execution Vulnerability

Lorna Mitchell: PHP 5.6 Benchmarks

Secunis.com: Travelsized CMS index.php Cross-Site Scripting Vulnerabilities


Community Events

Don't see your event here?
Let us know!


php7 example laravel opinion release framework video library introduction voicesoftheelephpant security api unittest community series language podcast laravel5 interview version

All content copyright, 2015 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework