Taras, Jose,

On Sun, Nov 23, 2008 at 7:31 PM, Taras P. Ivashchenko
<[EMAIL PROTECTED]> wrote:
> Andres,
>> But this isn't a buffer overflow, a format string, or something like
>> that, the only thing that I have to add is a 0xc0 char in front of
>> every character that would be normally escaped ( ; | & and some others
>> ). And by "exploiting" this vulnerability, w3af would be bypassing a
>> filter, like the ones that w3af bypasses when "fighting back"
>> gpc_magic_quotes in SQL injection exploitation.
>
> Yes, but gpc_magic_quotes is PHP specific option (for all versions
> before 6).
> And bypassing is specific security issue in PHP of specific versions on
> specific platforms (locales).
>
> I agree with José, that w3af isn't an vulnerability explotation
> framework so it may be out of the scope of the project.

Ok, I'm going to follow your advice and I won't add this feature to
the framework. Thanks for your comments and help!

Cheers,

> --
> Тарас Иващенко (Taras Ivashchenko), OSCP
> www.securityaudit.ru
> ----
> "Software is like sex: it's better when it's free." - Linus Torvalds
>



-- 
Andres Riancho
http://w3af.sourceforge.net/
Web Application Attack and Audit Framework
-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to