You can almost certainly set up suitable logging via your web server to trap the request that's being made that's causing the malicious content to be injected. That should allow you to figure out how to simulate the request, and hence help you close the hole.
Sorry to not be more help.
-- Foxcub
#include www.liquidfusion.org.uk
In reply to Re: CGI textfield injection
by Tanalis
in thread CGI textfield injection
by cmic
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |