On 03/01/17 19:17,
re...@mynetblog.com wrote:
> Do you know of a guide on how to idiot proof php for use on the public web?
>
> I have great concerns about people XSS'ing my site or other serious stuff.
> My problem is that I assume everything is going to get attacked and am afraid
> to put any php where people can access it.
The best source is
owasp.org you, there is a page with more php specific
stuff (not completed):
https://www.owasp.org/index.php/Category:PHP
Here is another site looking at the owasp top 10 and giving you some php
related information:
http://www.sklar.com/page/article/owasp-top-ten
> I just recently found out about the proxy variable where people set a "proxy"
> variable in their request header that when sent to a CGI script turns into http_proxy
> environment variable. So, I blocked that. (I think.)
Always disable those things you don't use, both in the php.ini and in
the server configuration, if you are administrator of the server.
> Attackers are actively scanning my site for vulnerabilities so I am fearful of putting
> anything on my site that they can attack because I know they will exploit any hole they find.
Just remember to validate data before you use it, say for example you
are expecting a numeric value be posted, then use
if(is_numeric($_POST['postedvaraible'])) {
//only now assign this value to a variable
$variableiwilluselaterinmycode = $_POST['postedvaraible'];
}
Look at the page at
sklar.com for some good advices, don't forget to
read the documentation at
php.net and there are many good comments to
read too on those pages.
--
//Aho