Displaying 7 results from an estimated 7 matches for "htmlspecialchar".
Did you mean:
htmlspecialchars
2006 Nov 13
1
php5 in centosplus update?
The recent htmlentities/htmlspecialchars bug was affecting all
versions of PHP older than 5.2.0. With that in mind, I was just
wondering if there is any timeframe to release a fix in centosplus
repository for PHP5 package? I've noticed that Red Hat released fixed
PHP5 packages for RHEL4 last week (php-5.1.4-1.el4s1.5).
--...
2015 Aug 11
4
Apache mod_perl cross site scripting vulnerability
Hello,
I've failed latest PCI scan because of CVE-2009-0796. Centos 6.7. The
Red Hat Security Response Team has rated this issue as having moderate
security impact and bug as wontfix.
Explanation: The vulnerability affects non default configuration of
Apache HTTP web server, i.e cases, when access to Apache::Status and
Apache2::Status resources is explicitly allowed via <Location
2015 Aug 12
0
Apache mod_perl cross site scripting vulnerability
...: contains '"><script>alert('xss')</script>'
That's your problem; they're flagging you for an XSS "vulnerability".
I'm guessing you have a custom 404 page that naively echoes the entire
request URL as part of the page? You need to be using
htmlspecialchars() or HTML::Entities or whatever your
language/environment has to escape strings for safe inclusion in HTML
content.
There is of course more to it than that (sigh), try for starters:
https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet
--ln
2005 May 05
5
snom mass deployment (probably off topic)
Hello
Although not stictly a asterisk issue, any help would be apreciated.
Firstly a few notes on the snom 360, which I have had on a test bed
for the last week. Its a great phone, with a good user interface,
both physically and its web based one.
At its lastest firmware it does have a few quirks, with regards to the
way it handles usernames and passwords on the physical interface.
These have
2015 Aug 12
2
Apache mod_perl cross site scripting vulnerability
...;<script>alert('xss')</script>'
>
> That's your problem; they're flagging you for an XSS "vulnerability".
> I'm guessing you have a custom 404 page that naively echoes the entire
> request URL as part of the page? You need to be using
> htmlspecialchars() or HTML::Entities or whatever your
> language/environment has to escape strings for safe inclusion in HTML
> content.
There is PHP generated 404 page. I'll check that with web developer.
What's strange, I'm trying to reproduce this and I don't see that
string. Trustwave su...
2005 Sep 21
0
HOWTO: A simple AGI application to modify incomi ng CallerID on the fly using SQL Server and *not* UnixODBC
...string to return
$sReturn = "<?xml
version=\"1.0\"?>\r\n<result
state=\"failure\">\r\n<error>$errstr</error>\r\n</result>\r\n";
}
else
{
//construct XML to send
//search and replace HTML chars in SQL first
$sSQL = HTMLSpecialChars($sSQL);
$sSend = "<?xml
version=\"1.0\"?>\r\n<request>\r\n<connectionstring>$this->sConnectionString
</connectionstring>\r\n<sql>$sSQL</sql>\r\n</request>\r\n";
//write request
fputs($fToOpen, $sSend);
//now read r...
2005 Sep 22
0
AGI Script to interact with ACCESS Databse a nd Set CID info on the fly.
...string to return
$sReturn = "<?xml
version=\"1.0\"?>\r\n<result
state=\"failure\">\r\n<error>$errstr</error>\r\n</result>\r\n";
}
else
{
//construct XML to send
//search and replace HTML chars in SQL first
$sSQL = HTMLSpecialChars($sSQL);
$sSend = "<?xml
version=\"1.0\"?>\r\n<request>\r\n<connectionstring>$this->sConnectionString
</connectionstring>\r\n<sql>$sSQL</sql>\r\n</request>\r\n";
//write request
fputs($fToOpen, $sSend);
//now read r...