![]() |
PHP injection?
Is PHP injection possible? The possibility just occurred to me. So far I haven't been successful in injecting PHP code through _REQUEST vars.
For example, http://www.domain.com/file.php?sort=");&order=DESC With this code: PHP Code:
|
Thats because 'sort' is holding the string, its not executed literally. Thats the same as going:
PHP Code:
|
That clears things up a bit. Thanks.
|
Correct. It cool.
Now, if it were enclosed in an eval() statement, then it would hit the fan. |
All times are GMT. The time now is 04:13 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|