[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <46228F44.10100@hardened-php.net>
Date: Sun, 15 Apr 2007 22:47:00 +0200
From: Stefan Esser <sesser@...dened-php.net>
To: Michal Majchrowicz <m.majchrowicz@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Cross Domain XMLHttpRequest
Hello,
> Thanks for showing this vulnerability :) In fact it was not supposed
> to be safe, but now it shoud be :) You are right this is not a
adding
if(strstr($_GET['url'],"file:"))
die;
is not safe at all...
Regard,
Stefan
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists