The following warnings occurred:
Warning [2] Undefined variable $unreadreports - Line: 26 - File: global.php(961) : eval()'d code PHP 8.2.25 (Linux)
File Line Function
/global.php(961) : eval()'d code 26 errorHandler->error
/global.php 961 eval
/showthread.php 28 require_once





× This forum is read only. As of July 23, 2019, the UserSpice forums have been closed. To receive support, please join our Discord by clicking here. Thank you!

  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Penetration testing
#8
As already discussed in the PMs but mentioning here for others, the client side JS/jQ code is helpful, but shouldn't be relied upon because it is easily bypassed/disabled. There is other US code that protects the database from dangerous inputs so SQL based attacks should be pretty unlikely.

The server side validation for input sanity should be fairly solid (and can be expanded if needed). What appears to be the weakness is how that validation is called. So the intention of the code may be vulnerable, but the DB and server side code seems to be pretty safe.

As Mudmin said, these issues are important to be addressed, and none of us is too proud to accept constructive criticism.
  Reply


Messages In This Thread
Penetration testing - by tomdickson - 03-18-2016, 09:30 AM
Penetration testing - by tomdickson - 03-18-2016, 11:56 AM
Penetration testing - by mudmin - 03-18-2016, 01:21 PM
Penetration testing - by mudmin - 03-18-2016, 01:26 PM
Penetration testing - by tomdickson - 03-19-2016, 02:14 AM
Penetration testing - by mudmin - 03-19-2016, 04:45 PM
Penetration testing - by mudmin - 03-23-2016, 01:14 PM
Penetration testing - by brian - 03-23-2016, 03:36 PM
Penetration testing - by tomdickson - 03-23-2016, 07:23 PM
Penetration testing - by mudmin - 03-25-2016, 01:27 PM

Forum Jump:


Users browsing this thread: 10 Guest(s)