Agora logo
Welcome to Agora!
 → 

Recent posts of VignacSecond

«  [1]  »
VignacSecond
Admin Force edit post.
Quote from: Pecon
Quote from: VignacSecond
how does it work ? ^^

It doesn't, not yet anyways. It was the last feature I left off on, I was overhauling the admin tools. As you can probably see, the only thing that was mostly finished there was the logging view.


Ok, can't wait to see the future moderation tools and features then ahah ^^ :)
VignacSecond
messages not working properly
Quote from: VignacSecond
Nice, You do a great job, thanks for your time.
Also, "Passwords must be at least 8 characters and no more than 72 characters long. Only letters, numbers, and most common ASCII special characters are allowed. Your password cannot begin or end with spaces." This rule is not respected when we want to change the password on our profile :/


Basically it's not good for the database if you can put a huge password.
You need to put this rule
Code
"<input type = "password" class = "registerPassword" minLength = "<? Php print ($ min_password_length);?>" MaxLength = "72" name = "password" tabIndex = "2 "autocomplete =" new-password "required pattern =" (^ [A-Za-z0-9! @ # $% ^ & * () \ -_ = + \ [\] {} | \\;: \ x27 \ x22,. / <>? ~] [A-Za-z0-9! @ # $% ^ & * () \ -_ = + \ [\] {} | \\;: \ x27 \ x22 ,. / <>? ~] {0.70} [A-Za-z0-9! @ # $% ^ & * () \ -_ = + \ [\] {} | \\;: \ x27 \ x22, ./<>?~$$) "value =" <? php print ($ fillPassword);?> "/>"
to the function to change the password in 'profile' (https: //agora.evalyn.app/?action=passwordchange).
VignacSecond
Admin Force edit post.
how does it work ? ^^
VignacSecond
test
retest
VignacSecond
test
aaaaaaaaaaaaaaaa
VignacSecond
There is a flaw in the forum !! (CSRF)
Okay :)
VignacSecond
There is a flaw in the forum !! (CSRF)
VignacSecond
There is a flaw in the forum !! (CSRF)
Quote from: Wikipedia
Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf[1]) or XSRF, is a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts.[2] There are many ways in which a malicious website can transmit such commands; specially-crafted image tags, hidden forms, and JavaScript XMLHttpRequests, for example, can all work without the user's interaction or even knowledge. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser.

In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end user's account.


Example with Agora : [img]https://agora.evalyn.app/?action=promote&id=1527[/img]


How to solve it :
-You have to add
Code
if(isSet($_GET['as'])) if($_SESSION['actionSecret'] == $_GET['as'])
everywhere.
-Possibly a longer token, otherwise it would be "easy" to "bruteforce" by generating
VignacSecond
messages not working properly
Nice, You do a great job, thanks for your time.
Also, "Passwords must be at least 8 characters and no more than 72 characters long. Only letters, numbers, and most common ASCII special characters are allowed. Your password cannot begin or end with spaces." This rule is not respected when we want to change the password on our profile :/
«  [1]  »