Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

A Web Application Exploitation Expose

twistedmoney99 (1045980) writes | about 7 years ago

Security 0

twistedmoney99 (1045980) writes "Installing an insecure web application is dangerous for the website operator, its visitors, the hosting provider, as well as any other clients of that provider. In an expose of one such web application, Seth Fogie walks through the testing of a commercial application (EZPhotoSales), gaining access to sensitive data, bypassing applications protections, finding permanent cross-site scripting bugs, gaining shell access, and obtaining access to the web pages and scripts of all the other clients of the hosting provider. If you are a user of this software, the article does include a few tips on how to secure the application. Ironically, the application developer did take measures to protect their intellectual property using ionCube (a PHP encoder) — if only the same efforts were made to protect the customer."
Link to Original Source

cancel ×

0 comments

Sorry! There are no comments related to the filter you selected.

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>