dimanche 30 novembre 2014

php execution possibility in img src



I am making one of my simple application. There is an option to download generated image. For that, my php code is:



<?php
if (isset($_GET['img_name'])){
?>
<html>
<img src="<?php echo $_GET['img_name'];?> "></html>
<?php
}
?>


I know this is vulnerable for xss. But this is not the problem. Question is, is it possible for attacker to include or execute php file or code via this option ? I know that, for echo and img tag php will not execute here.


What you think researchers? Am i safe ?





Aucun commentaire:

Enregistrer un commentaire