开发者

Would this redirect script open me up for code injection or remote file inclusion?

Recently I ran across a blog article about using PHP scripts to redirect affiliate links. It got me thinking whether this script was safe or not. I've heard that using the $_GET variable can lead to a vulnerability.

Any suggestions would be appreciated. Would checking the input for alphanumerics and the hyphen ('-') be enough to guard against this?

For this script, links in would be of the form:

http://www.somesite.com/amazon.php?asin=XXXXXXXXXX

or

http://www.somesite.com/amazon.php?id=some-keyword

Here is amazon.php:

   <?php

    $id = $_GET['id'];
    $asin = $_GET['asin'];

    if ($asin != NULL)
    {
        header("Location:http://www.amazon.com/exec/obidos/ASIN/".$asin."/fantasticaffiliate-20");
        exit;
    }

    else
    {
        $links = array(
            "keyword-one" => "http://www.amazon.com/b/?node=1122334455&tag=fantasticaffiliate-20",
            "keyword-two" => "http://www.amazon.com/exec/obidos/ASIN/1352434213/fantasticaffiliate-20"
            );          

  开发者_Python百科      header("Location:".$links[$id]);
        exit;
    }

?>

Thanks as always!


Yes, it would. None of those characters in any combination is enough to cause a XSS problem.

0

上一篇:

下一篇:

精彩评论

暂无评论...
验证码 换一张
取 消

最新问答

问答排行榜