Forum Moderators: coopster
They are well packaged and supposedly very secure with various elements in place to reduce exposure to things such as injection viruses etc
In the last month I have noticed a couple of enquiries coming in that are obvious spam but the coding is so weird that it suggests something more sinister than an automated link drop.
Ive received a few today with the following quoted in the comments box:
You did this great job here!
chsbs.example.edu/iopa/_disc1/00000189.ht
m?cialis
cialis [chsbs.]
href=\"http://www.chsbs. example.edu/iopa/_disc1/0000
0189.htm?cialis\">cialis
Can anyone confirm whether these forms are just misdirected link spam aimed at blog comment software. Or something more worrying?
Is there any mechanism thru which a hacker can cause damage to your site or even hijack it thru the php response form?
Any advice much appreciated
[edited by: jatar_k at 2:46 pm (utc) on Jan. 4, 2007]
[edit reason] examplified url [/edit]
Is there any mechanism thru which a hacker can cause damage to your site or even hijack it thru the php response form?
Not with this sort of spam but you ought to be aware of the potential security holes that exist. You should make sure that the PHP option register_globals is off and that your script does not require it, and that any input data is properly escaped before being processed (the classic mistake being to take input data and use it in an SQL query without ensuring all special characters are escaped).
If as you say your form is secure then the developer will have thought about these matters, but if, for example, the forms were developed by a skilled developer then adapted by a novice for your particular purpose it is entirely possible that loopholes will have been introduced.
I have received some more today and it becomes increasingly more bizarre:
"hamContent-Transfer-Encoding: quoted-printableContent-Type: text/htmlSubject: that time itbcc: lianna@example.comry cured hams require a prolonged period of rehydration prior to consumptio=n=2E wet cured ham has been cured with a brine, either by immersion or inje=ction. he679c4c6da97a5d98679c46e1634a8c40."
Is there a big market for cured ham on the web?
Curiously theyve targetted only one page on a large site to send in these nonsensical forms
Had a few that mention "transfer-encoding" and I dont like seeing the word "inje=ction" but right now Im not going to lose any sleep over it.
[edited by: jatar_k at 2:25 pm (utc) on Jan. 5, 2007]
[edit reason] examplified [/edit]
On my enquiry form email response that we receive from the customer I have a subject line that is different on every page - so for example you would have:
Widget enquiry - BLUE
Widget enquiry - RED
Now today Ive seen that the spammers are somehow managing to amend the subject line text which is embedded within the html on the page -its not hidden at all but is simply quoted within the >name="postedfrom" value=< attribute
Is this something that needs fixing? If they can change this does it suggest a wider problem or is the subject line in this context easy to adjust provided its visible on the html of the page?
It really makes no sense to me but I guess these aholes may be wrongly assuming that the form is a "comment" blog form and therefore links will be enabled on posting
Thanks for all your comments so far
Combatting Webform Hijack [webmasterworld.com]
PHP Security [webmasterworld.com]
it looks like you aren't properly cleaning the form input. If they are changing the subjects then that is a rather serious problem.
If I find any headers, the email doesn't get sent, and a "Tastes Like SPAM" message is shown. The same for blank subjects and bodies (the typical "ping" message from spammers testing the waters).
Business levels are normal and forms are still coming in so Im shocked that the issues raised are serious. Clearly though Im not going to sit here and wait for things to go bang.
Main problem I have is that I am not a programmer and I have insufficient knowledge to deal with these key security issues myself.
Instead I will need to outsource and my preference is to simply start over with a new form. Its cheaper and I think Id feel more comfortable doing this.
I have been speaking to some programmers about a more advanced form and as usual you are torn between losing customers because the form is too complex or keeping things secure by adding for example image verification etc. Im going to opt for the latter because I cant risk any more problems like this.
Can anyone recommend a secure form mechanism - CAPTCHA has been mentioned to me as one such option
Many thanks