php security holes POCs
- by Flavius
Hi
Please provide examples for all of these: XSS, CSRF, SQL injection with both the source code and the attack steps for each.
Other attack vectors are welcome. The most complete answer gets a accepted.
The configuration is a fairly standard one, as of PHP 5.3.2, core settings:
allow_call_time_pass_reference => Off => Off
allow_url_fopen…