[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
OK, .. this one's a stumper.
Everyone knows mailer scripts are a security hole, .. historically, they
are restricted by referer URL & recipient address patterns. Recipient works
pretty well, as the only allowed output email address can be tightly
controlled.
Unfortunately, it seems like there some of the script kiddies have found
ways to get around the referer URL - i.e. By posting the form directly to
the form mailer, they are apparently also forging the environment variables
to satisfy the referer check. I tried changing from referer URL to matching
the server address, .. but it DNW either. (Obviously, the first action was
to delete the calling document so it cannot be invoked in any form on the
server.)
Is anyone aware of a more secure way to valdate the source document other
than referer URL or server address? Or is there a way to secure the mailer
itself (callable from a number of domains)?
Thanks!
Lee
-
To unsubscribe, send email to majordomo@silug.org with
"unsubscribe silug-discuss" in the body.