security

System.NotSupportedException. The URI prefix is not recognized.

I have a WCF service, in two machine in Preproduction environment, machine A and machine B. Only in machine B, the service fails when I call it (from biztalk proccess), another machine is right. The configuration of service in both machines is the same. I get this error: System.NotSupportedException, mscorlib, Version=2.0.0.0, ...

PHP strpos() returning odd results

Hi folks, I've written a basic 'security checker' for my webapp. I'll need to see at a glance whether user-submitted code contains evil stuff. Here is a screenshot of the code that I'm running this against right now: http://cl.ly/677a6dc40034f096697f Here is the PHP code I'm using against these three bits of code: <!-- The View --> ...

allowing any javascript to be injected on my page. What's the risk ?

if my webserver just serves static pages and my html pages allow users to run any javascript. Can a 'bad' user do any damage to me ? p.s. There are lots of talk about watching out about XSS and what I am doing is even worse. I am letting the user to inject his/her javascript. what I don't get is what damage can they do ? Thanks ...

Sanitizing SQL data

Google turns up all sorts of discussions on sanitizing queries for web access but I'm not finding anything addressing what I'm concerned with: Sanitizing user input data in a c# program. This must be done by a reversible transformation, not by removal. As a simple example of the problem I don't want to mangle Irish names. What's the ...

Which is quicker; Comparing text against an array, or an external file?

I have to implement a "bad words" filter on my website, which is a classifieds website. I have a big list of "bad words" but don't know which method is best to compare the user inputs to. In my case, a textarea inside a form, needs to be checked for "bad words". <form name="test" action="test.php" method="post"> Inside test.php I...

Safely passing a URL through a URL to open in iframe

Hi, I'm trying to pass URL to a website so it can be opened in an iframe, the URL is for a registration confirmation so users get their id / password, I know how to do that and the URL opens fine, but what are the implications for the website it is being passed to (it is an online store). Here is the script on the store site: <? echo ...

Is it good style to call bash commands within a Python script using os.system("bash code")?

I was wondering whether or not it is considered a good style to call bash commands within a Python script using os.system(). I was also wondering whether or not it is safe to do so as well. I know how to implement some of the functionality I need in Bash and in Python, but it is much simpler and more intuitive to implement it in Bash. H...

Secuity considerations when including files

Hello I am preparing to setup a request routing system in php based on the $_GET array. For example, for the url ?r=login I'd use include myfiles/".$_GET['r'].".php"; Which would point automatically to myfiles/login.php I know I need to sanitise the get input, but I'm concerned as it is possible to maliciously redirect the include. Ca...

Another file permissions problem

I have a classifieds website, and when users post a new classified, they may chose to upload images. My php code takes the chosen image, uploads it to a image folder, and names it accordingly. The problem here is, I have to set the images folder to 777 in order for this to work. My question is, what should the permissions be set to? A...

File permissions; Should my www-folder content be owned by www-data?

This might be a noob question, but can't find an answer anywhere. I have a problem, which http://stackoverflow.com/questions/3483832/another-file-permissions-problem have helped me to ALMOST solve. I have created a user in linux (danny) which has sudo access. I have also created a new group which name ALSO is danny, and added the user ...

How is system security affected by App to App comunication, and component reuse?

Whilst reading 'Gray Hat Hacking', I encountered this statement Applications and operating systems use each others components, users download different code to extend functionality, DLLs are installed and shared, and instead of application-to-operating system communication, today many applications communicate directly with eac...

Php: is it safe to open a file with the fileName given through the url [if] filtered like this ?

The url would be something like this: www.example.com/index.php?file=myFile.ext The filtering would only allow leters and numbers in the file, and only one dot. The filtering would not give characters from the input to the file functions, instead, on for every allowed character it matches in an internal array, it copies the character...

SQL-injection - is this (oneliner) safe ?

PHP: $SQL = "SELECT goodies FROM stash WHERE secret='" . str_replace("'",'',$_POST['secret']) . "'"; Could an evil genius hacker inject SQL into my SELECT - How ? ...

Securing one particular file on the server; .htaccess good way of doing it?

I have a classifieds website. I as an administrator need to be able to remove classifieds as I wish... So I have created a very simple remove function which only requires the name of the classified. I plan on placing it on the server ONLY when I need to remove classifieds, so it wont be there unless I upload it and plan on using it. Th...

Why Does OAuth v2 Have Both Access and Refresh Tokens?

Section 4.2 of the draft OAuth 2.0 protocol indicates that an authorization server can return both an access_token (which is used to authenticate one's self with a resource) as well as a refresh_token, which is used purely to create a new access_token: http://tools.ietf.org/html/draft-ietf-oauth-v2-10#section-4.2 Why have both? Why not...

Sharepoint user can view site collections he is not a member of

Hi there ,as i understand sitecollection security ,member of a given sitecollection can not view another site collection where he has no membership ,my problem is that any user from a given site collection can view other site collection easily ,how is that ? by the way ,this user is not an administrator ,he is a domain user ,with approve...

How secure are CDNs for delivering jQuery?

We build sites that have a public (non-secured) area and secured (delivered over HTTPS) area and we use jQuery library. Recently I suggested we use Google CDN for jQuery delivery. Some of my colleagues expressed concerns in regards to security aspect of this way of delivering JavaScript libraries. For example, they mention the scenario ...

Should someone with no PHP experience use a framework like CakePHP or Symfony?

I have a simple site to develop and would like to learn PHP as I go. I want the site to be secure, scalable, and easy to maintain. Should I learn a framework and PHP simultaneously? If I build off of a framework there will be lots of unfamiliar code in play. Would you say this increases security risks? ...

Source code security on Trac

I have trac set up together with subversion. I want to allow some people to be able to add tickets, but I don't want them to access the repository. There will be other users who will be able to access the repo via trac. Currently I am using Apache 2 for authentication. How secure is trac? How difficult is it for someone with limited acc...

ASP.NET/IIS7 - Securing access to SQL Server for multiple user roles

I'm working on an web application using ASP.NET 4.0, C#, and IIS7. The web application is a content management system that defines multiple user roles, such as editor and administrator. These users and roles are managed by the asp.net membership framework, and the associated database tables are integrated into the web app's database usin...