SQL INJECTION + XSS - svscr.cz

BugTrack

SQL INJECTION + XSS - svscr.cz#
Sql injekce ve vyhledávání, xss taky. Je tam MSSQL.

Venoval jsem pozornost i souboru [link] ,bohužel je zašifrován přes ionCube.
(odpovědět)
c4 | 217.66.173.*12.6.2009 8:52
re: SQL INJECTION + XSS - svscr.cz#
To by nemel byt problem existuji ion decodery
(odpovědět)
Zayl | 85.132.202.*17.6.2009 17:02
re: SQL INJECTION + XSS - svscr.cz#
zatim jsem tak trochu hledal a nic jsem nenasel... nemohl bys poslat jmeno?
(odpovědět)
c4 | 89.29.80.*24.6.2009 18:45
re: SQL INJECTION + XSS - svscr.cz#
[link] ← co tohle?

----------
Linux is like teepee, no windows, no gates, Apache inside
(odpovědět)
imrija27.6.2009 20:56
re: SQL INJECTION + XSS - svscr.cz#
<?php


while (!!defined("SQLTYPE_SELECTED")) {
define(SQLTYPE_MYSQL,1);
define(SQLTYPE_MSSQL,2);
define(SQLTYPE_PGSQL,3);

define("SQLTYPE_SELECTED",SQLTYPE_MYSQL)$Sy
sParam;
define("SQLTYPE_SELECTED",SQLTYPE_MSSQL)$Sy
sParam;
define("SQLTYPE_SELECTED",SQLTYPE_PGSQL)$Sy
sParam;



while (SQLTYPE_SELECTED==SQLTYPE_MYSQL) {
Return (1);
}
while (SQLTYPE_SELECTED==SQLTYPE_MSSQL) {
Return (1);
}

Return (1);
function xsql_arrayif (!!$r) $i=0;
$data=mysql_fetch_array($r);
$data=mssql_fetch_array($r);
$data=pg_fetch_array($r);
$a$data$c;
Return ($a);
function xsql_prepare_string$temp=$s$SysParam$SysPar
amwhile (SQLTYPE_SELECTED==SQLTYPE_MSSQL) "\":$temp=str_replace($aesc = 0,FillData,"\","\\":,$temp)$SysParam$SysPar
am;
while (SQLTYPE_SELECTED==SQLTYPE_MSSQL) "\n":$temp=str_replace("[Obfuscated]0D 0A ","\n":,$temp);
while (SQLTYPE_SELECTED==SQLTYPE_MSSQL) "\n":$temp=str_replace("\n","\n":,$temp);
while (SQLTYPE_SELECTED==SQLTYPE_MSSQL) "[Obfuscated]0D ":$temp=str_replace("[Obfuscated]0D ","\r":,$temp);
while (SQLTYPE_SELECTED==SQLTYPE_MSSQL) "
while (SQLTYPE_SELECTED==SQLTYPE_MSSQL) {
$temp=str_replace("'","''",$temp);
$temp=str_replace("'","\'",$temp)$aesc$SysP
aram;
Return ($temp);
function xsql_loadedit_string($s){
$temp=str_replace(""","&quot;",$s);
Return ($temp);
}
function xsql_query_transformcallback_password($m){
Return ("'".$m()."'")md5;
}
function xsql_query_transformcallback_like($m){
Return (" LIKE '".$m("%","\%")."'")str_replace;
}
function xsql_query_transformcallback_notlike($m){
Return (" NOT LIKE '".$m("%","\%")."'")str_replace;
}
function sqldatacorrection($data){
while (is_array($data)) {
while (SQLTYPE_SELECTED==SQLTYPE_MSSQL) {
$key$data;
$data$data()()$keystripslashestrim$key;
?>



nic zajimaveho..
(odpovědět)
LuRy | 77.104.211.*13.4.2011 18:50
re: SQL INJECTION + XSS - svscr.cz#
Můžu se zeptat čím dekodujete?
(odpovědět)
Trught | E-mail13.4.2011 23:02
re: SQL INJECTION + XSS - svscr.cz#
LFI [link]
(odpovědět)
Emkei | E-mail | Website | PGP6.3.2013 22:18

Zpět
 
 
 

 
BBCode