-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Michal ?iha? schrieb:
On Thu, 20 Apr 2006 14:50:55 +0200 Michal ?iha? michal@cihar.com wrote:
Both is quite simple (see attached patch). Only problem is when to check whether token is correct. For now I added check to import.php and sql.php, are there any other dangerous places?
Problematic places are many :-(. Eg. dropping users using URL:
http://localhost/pma-2.8.0/server_privileges.php?selected_usr%5B%5D=aaa%1B%2...
It will be quite hard to spot all such places. Any better idea how to protect against such XSS?
token can be checked globaly in common.lib.php
if token is wrong empty all $_REQUEST/GET/POST
- -- Sebastian Mendel
www.sebastianmendel.de