Hi, I am currently stuck at the injection.
So what I have done:
–removed
The problem is the character limit, so –removed
–removed
After submitting these messages, I get two instead of one message on the “Contact”-page.
So, I looked at the site-source and see that –removed will not “removed word” with –removed , although the syntax is not wrong.
My question is, why does this happen and what do I do wrong?
Usually, the ‘+’ operator has a higher priority than the ‘=’ operator.
@bolofecal: Which one do you mean, the first or second one?
I removed the code part of my first post, so there is just the post left, but I don’t know whether it is too big of a spoiler.
Finally!! I got the injection and the data that I wanted to get:
Now I get the message “Session has expired”
Congrats to find the method, but think in this:
The target site is run by security “experts” so they will be more suspicious than most. If they notice anything suspicious they are more likely to act.
?
So, I think that I know why the user detects the “suspicious activity”.
The problem is still the..
..char-limit. I know an another method to inject my code, but it will not work with that limit.
Is there a method to break (disabling) the limit instead of bypassing it?
Maybe the script uses something like this:
echo substr('abcdef', 0, 3);
//abcd
Maybe you can find some method to bypass it or try another method.
?
Now I tried different things, still getting “user logged out”. There is a filter that detects a specific string in the message. I think I know what string triggers the user logout, but I don’t know an another way.
Congratulations @Bloody_Angel !!