in reply to HTML Template
You also have a possible exploit waiting to happen (although, imo, the risk in this case is pretty small):
$yeardir=$ENV{'QUERY_STRING'}; ... opendir(DIR, "d:/wwwroot/CalvaryBaptist/Sermons/".$yeardir);
$yeardir is unsanitized, meaning that an external user (the person controlling the web browser), is able to specify any directory on your D: drive to search. The risk is mitigated somewhat because you are searching for stuff that ends in .wmv. However, if there are other protected directories containing wmv files that the general user should not have access to, that protection could be bypassed here. In general, you want to sanitize your inputs from untrusted sources.
--MidLifeXis
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^2: HTML Template
by raptorsoul (Novice) on May 10, 2015 at 05:36 UTC | |
by afoken (Chancellor) on May 10, 2015 at 09:38 UTC |