News Feed
Jobs Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Secunia.com:
TCExam PHP Code Execution and Cross-Site Scripting
May 01, 2007 @ 14:18:00

TCExam users will definitely want to pay attention to this latest advisory posted by Secunia detailing a PHP code execution and cross-site scripting issue that's been found:

rgod has discovered two vulnerabilities in TCExam, which can be exploited by malicious people to conduct cross-site scripting attacks or to compromise a vulnerable system.

The two issues is related to two different inpus not being handled properly - the mishandling of the SessionUserLang cookie and the _SERVER[SCRIPT_NAME] value. Neither of these are being sanitized.

This issue effects users of the TCExam 4.x series but a new version, 4.1.000, has already been released and made available for download.

0 comments voice your opinion now!
tcexam crosssitescripting xss execution sanitize tcexam crosssitescripting xss execution sanitize


blog comments powered by Disqus

Similar Posts

International PHP Magazine: IPM Poll Question: Which One is Most Dangerous?

Bence Eros' Blog: Request execution in Kohana 3.1

SitePoint PHP Blog: PHP Security - Dumb Users or Dumb APIs?

Padraic Brady's Blog: HTML Sanitisation: The Devil's In The Details (And The Vulnerabilities)

Smashing Magazine: Keeping Web Users Safe By Sanitizing Input Data


Community Events











Don't see your event here?
Let us know!


composer language hack security unittest release hhvm component install package symfony2 application code opinion overview introduction facebook example framework podcast

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework