B
Bernhard Sturm
Hi Group
I don't know if it's the right place to ask, but I'll try it:
I have set up a site using PHP includes for the content parts of a page:
I have one index.php that uses different includes for menu, navigation,
footer and header. the content is included through this part of the code:
<div id="middle" align="left">
<?php // content einbinden
include($content);
?>
<br />
</div>
via URL parameter content the content is fed to the index.php. Like this:
http://cellntec/sandbox/index.php?content=contact/index.php
Where the content is kept in content/index.php e.g.:
<p>Using novel progenitor cell-targeted isolation techniques and culture
media, xxxx
Advanced Cell Systems has developed a range of epithelial in vitro
systems with
a striking suite of features. These include</p>
now my host has shut down the site because he says that this will put a
threat to all his virtual servers on the same server... I have no clue
(and maybe my PHP knowledge is too limited...) Is there a known exploit
for URL parameters?
thanks for any reply
bernhard
I don't know if it's the right place to ask, but I'll try it:
I have set up a site using PHP includes for the content parts of a page:
I have one index.php that uses different includes for menu, navigation,
footer and header. the content is included through this part of the code:
<div id="middle" align="left">
<?php // content einbinden
include($content);
?>
<br />
</div>
via URL parameter content the content is fed to the index.php. Like this:
http://cellntec/sandbox/index.php?content=contact/index.php
Where the content is kept in content/index.php e.g.:
<p>Using novel progenitor cell-targeted isolation techniques and culture
media, xxxx
Advanced Cell Systems has developed a range of epithelial in vitro
systems with
a striking suite of features. These include</p>
now my host has shut down the site because he says that this will put a
threat to all his virtual servers on the same server... I have no clue
(and maybe my PHP knowledge is too limited...) Is there a known exploit
for URL parameters?
thanks for any reply
bernhard