News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Secunia.com:
TCExam PHP Code Execution and Cross-Site Scripting
May 01, 2007 @ 14:18:00

TCExam users will definitely want to pay attention to this latest advisory posted by Secunia detailing a PHP code execution and cross-site scripting issue that's been found:

rgod has discovered two vulnerabilities in TCExam, which can be exploited by malicious people to conduct cross-site scripting attacks or to compromise a vulnerable system.

The two issues is related to two different inpus not being handled properly - the mishandling of the SessionUserLang cookie and the _SERVER[SCRIPT_NAME] value. Neither of these are being sanitized.

This issue effects users of the TCExam 4.x series but a new version, 4.1.000, has already been released and made available for download.

0 comments voice your opinion now!
tcexam crosssitescripting xss execution sanitize tcexam crosssitescripting xss execution sanitize


blog comments powered by Disqus

Similar Posts

Chris Shiflett\'s Blog: Google XSS and Evil Character Encoding

Gareth Heyes' Blog: PHP self return of the slash

Insane Security Blog: PHP 5.2+ Data Filtering Extension = BAD?

Pierre-Alain Joye's Blog: PHP Security Conference in Paris, 2007/01/29

Secunia.com: TCExam PHP Code Execution and Cross-Site Scripting


Community Events

Don't see your event here?
Let us know!


introduction list opinion community series language example yii2 interview laravel framework testing part2 symfony project podcast composer api application php7

All content copyright, 2015 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework