You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This project is mainly rely on pan.baidu.com, which will never be hacked. Only the data are valid will it be stored.
Anyway, thanks for your suggestion.
Hello,
I would like to report for possible vulnerabilities.
In file functions.php https://github.com/yuantuo666/baiduwp-php/blob/master/functions.php, line 222
all the variables are controlled by the user. For example, In file index.php https://github.com/yuantuo666/baiduwp-php/blob/master/index.php, line 335
Then the url will pass to curl_exec in line 47 in file functions.php
The result will be passed to the DB (Possible SQLI).
Like the line 394 in index.php
Or will be printed (Possible XSS).
If the attacker can control the output of the curled website then he will be able to pass some queries to the DB.
I will recommend to sanitize the output of the $result in functions post and get in functions.php
The text was updated successfully, but these errors were encountered: